20145317 Peng Yao "Information Security system design basics" NO. 0 Week study Summary
Feelings:
The relationship between the student and the teacher: fitness instructor and fitness trainee. Students want to build a good body but do not know the path and method, so to find the coach, the coach needs to do is to guide the students to correct exercise posture and exercise methods, then the whole thing is to see the students themselves.
For the new semester new curriculum, I hope I can be more serious than last time, more efficient than the previous semester, and then actively cooperate with the teacher's teaching work, but also constantly improve themselves.
Problem:
Chapter One computer system roaming
How the processor, the buffer, and the memory in the computer operating system work together in operation.
chapter II Representation and processing of information
How do computer arithmetic operations cause computer security vulnerabilities?
Chapter III Machine-level representation of the program
What's underneath the abstraction layer provided by the C language?
Fourth Chapter processor architecture
How is the sequence of processor architectures implemented?
fifth. Optimizing Program Performance
How does the compiler generate efficient code, and what short board does he have?
Sixth chapter Memory hierarchy
How to determine if a memory unit is in steady state
Seventh Chapter Links
When and how can a link be done?
eighth. Abnormal control Flow
How does exception control flow work at every level of the computer?
nineth Chapter Virtual Memory
What are the three important features that virtual storage provides?
Tenth chapter System level I/O
What are the three related data structures used by the UNIX kernel to represent open files?
The 11th Chapter Network Programming
How the server passes additional information to the child program
12th Chapter Concurrent Programming
What is a POSIX thread?
20145317 "Information Security system Design Fundamentals" NO. 0 Week study summary