The 15th week summary of the Design foundation of information security system
"Content: Link Summary"
One, weekly reading notes link summary
[First week's reading notes] http://www.cnblogs.com/shadow135211/p/4824555.html
[Second week's reading notes] http://www.cnblogs.com/shadow135211/p/4842258.html
[Third week's reading notes] http://www.cnblogs.com/shadow135211/p/4854920.html
[Fourth Week reading notes] (reading notes from the "First week" began to name, in order to complete and other students of the gap, here skip "Fourth Week" directly write "Fifth week"; reading notes the total number of articles unchanged)
[Fifth week reading notes] http://www.cnblogs.com/shadow135211/p/4870115.html
[Sixth week reading notes] http://www.cnblogs.com/shadow135211/p/4890199.html
[Seventh Week reading notes] http://www.cnblogs.com/shadow135211/p/4912621.html
[Eighth Week reading notes] http://www.cnblogs.com/shadow135211/p/4928347.html
[Nineth Week Reading notes] http://www.cnblogs.com/shadow135211/p/4947912.html
[Tenth Week reading notes] http://www.cnblogs.com/shadow135211/p/4967270.html
[11th Week Reading notes] http://www.cnblogs.com/shadow135211/p/4986767.html
[12th Week Reading notes] http://www.cnblogs.com/shadow135211/p/5005418.html
[13th Week reading notes] http://www.cnblogs.com/shadow135211/p/5023893.html
[14th Week Reading notes] http://www.cnblogs.com/shadow135211/p/5042451.html
Second, the experimental report link summary
[Experiment One] http://www.cnblogs.com/shadow135211/p/4977226.html
[Experimental two firmware design] http://www.cnblogs.com/shadow135211/p/5011324.html
[Transplant of experimental three-real-time system] http://www.cnblogs.com/shadow135211/p/5011329.html
[Experimental four peripheral drive design] http://www.cnblogs.com/shadow135211/p/5023867.html
[Experimental five communication Protocol design] http://www.cnblogs.com/shadow135211/p/5023869.html
Third, the Family Work link Summary (Division registration error, 6.45 should be 6.43,6.44)
[Homework: 2.59 (2), 3.54 (1), 6.43 (2), 6.44 (2), 8.9 (1), 8.13 (1), 8.16 (1)]http://www.cnblogs.com/shadow135211/p/4986669.html
Iv. Summary of Practice activity links
No
V. Lessons learned and deficiencies
- Personal Harvest
- Have mastered some basic skills:
- Markdown tools;
- Youdao Cloud notes, cloud Collaboration group;
- The use of experimental building and other online experimental platform;
- Blog Park discussion platform utilization;
- Develop the habit of punching the scallops;
-
-
- ia32,
- Introduction to memory hierarchy and caching principles,
-
- The access mode of virtual memory and common errors in C language,
- rio package;
-
-
- Learning mode:
- learning content:
-
- Extracurricular development is very small.
- To learn from the younger brothers learn advice:
- Good memory is better than bad writing, the teacher in class to talk about the most of the essence of practice, the best to carefully record;
- Follow the course progress, step backward, step backward.
- Advice to the teacher:
- The initial task volume (especially the first week's task volume) is indeed relatively large, and it is recommended that teachers take a "pre-informed course schedule" and "appropriate mitigation of the first week's task volume" approach.
The 15th week summary of the Design foundation of information security system