20145317 "Information Security system Design Fundamentals" NO. 0 Week study Summary

Source: Internet
Author: User

20145317 Peng Yao "Information Security system design basics" NO. 0 Week study Summary

Feelings:

The relationship between the student and the teacher: fitness instructor and fitness trainee. Students want to build a good body but do not know the path and method, so to find the coach, the coach needs to do is to guide the students to correct exercise posture and exercise methods, then the whole thing is to see the students themselves.

For the new semester new curriculum, I hope I can be more serious than last time, more efficient than the previous semester, and then actively cooperate with the teacher's teaching work, but also constantly improve themselves.

Problem:

Chapter One computer system roaming

How the processor, the buffer, and the memory in the computer operating system work together in operation.

chapter II Representation and processing of information

How do computer arithmetic operations cause computer security vulnerabilities?

Chapter III Machine-level representation of the program

What's underneath the abstraction layer provided by the C language?

Fourth Chapter processor architecture

How is the sequence of processor architectures implemented?

fifth. Optimizing Program Performance

How does the compiler generate efficient code, and what short board does he have?

Sixth chapter Memory hierarchy

How to determine if a memory unit is in steady state

Seventh Chapter Links

When and how can a link be done?

eighth. Abnormal control Flow

How does exception control flow work at every level of the computer?

nineth Chapter Virtual Memory

What are the three important features that virtual storage provides?

Tenth chapter System level I/O

What are the three related data structures used by the UNIX kernel to represent open files?

The 11th Chapter Network Programming

How the server passes additional information to the child program

12th Chapter Concurrent Programming

What is a POSIX thread?

20145317 "Information Security system Design Fundamentals" NO. 0 Week study summary

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.