{"id":698,"date":"2016-05-21T19:40:38","date_gmt":"2016-05-21T19:40:38","guid":{"rendered":"http:\/\/blogs.softwareclue.com\/?p=698"},"modified":"2016-05-21T19:40:38","modified_gmt":"2016-05-21T19:40:38","slug":"%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b","status":"publish","type":"post","link":"http:\/\/blog.softwareclues.com\/zh\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b","title":{"rendered":"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b"},"content":{"rendered":"<blockquote><p>\u82f1\u6587\uff1aMatt<\/p>\n<p>\u8bd1\u6587\uff1a\u4f2f\u4e50\u5728\u7ebf &#8211; \u963f\u55b5<\/p>\n<p>\u94fe\u63a5\uff1ahttp:\/\/blog.jobbole.com\/101168\/<\/p>\n<p><a href=\"http:\/\/mp.weixin.qq.com\/s?__biz=MzA4MjEyNTA5Mw==&amp;mid=2652563514&amp;idx=2&amp;sn=5d52fd106fa148c72a1a6fb594c9a7dd&amp;scene=21#wechat_redirect\" target=\"_blank\">\u70b9\u51fb \u2192 \u4e86\u89e3\u5982\u4f55\u52a0\u5165\u4e13\u680f\u4f5c\u8005<\/a><\/p><\/blockquote>\n<p>\u8003\u8651\u5230\u8ba1\u7b97\u673a\u79d1\u5b66\u9886\u57df\u7684\u81a8\u80c0\u589e\u957f\uff0c\u60f3\u8981\u8fa8\u8bc6\u73b0\u4ee3\u8ba1\u7b97\u673a\u79d1\u5b66\u5230\u5e95\u5305\u542b\u4ec0\u4e48\uff0c\u6210\u4e86\u4e00\u4ef6\u6709\u6311\u6218\u6027\u7684\u4e8b\u3002\u6211\u4eec\u7cfb\u8fdb\u884c\u4e86\u8fd9\u4e2a\u8ba8\u8bba\uff0c \u6240\u4ee5\u6211\u6574\u5408\u4e00\u4e0b\u81ea\u5df1\u7684\u60f3\u6cd5\u6765\u5f53\u4f5c\u8fd9\u4e2a\u95ee\u9898\u7684\u89e3\u7b54\uff0c\u201c\u6bcf\u4e2a CS \u7cfb\u7684\u5b66\u751f\u5e94\u5f53\u77e5\u9053\u54ea\u4e9b\u4e8b\uff1f\u201d<\/p>\n<p>\u6211\u5c1d\u8bd5\u4ece 4 \u00a0\u65b9\u9762\u6765\u56de\u7b54\u8fd9\u4e2a\u95ee\u9898\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>\u5b66\u751f\u60f3\u8981\u83b7\u5f97<strong>\u597d\u7684\u5de5\u4f5c<\/strong>\u5e94\u5f53\u77e5\u9053\u54ea\u4e9b\u4e8b\uff1f<\/li>\n<li>\u5b66\u751f\u60f3\u8981\u5f97\u5230<strong>\u7ec8\u751f\u96c7\u4f63<\/strong>\u5e94\u5f53\u77e5\u9053\u90a3\u4e9b\u4e8b\uff1f<\/li>\n<li>\u5b66\u751f\u60f3\u8981\u8fdb\u5165<strong>\u7814\u7a76\u751f\u9662<\/strong>\u5e94\u5f53\u77e5\u9053\u54ea\u4e9b\u4e8b\uff1f<\/li>\n<li>\u5b66\u751f\u60f3\u8981<strong>\u6709\u76ca\u4e8e\u793e\u4f1a<\/strong>\u5e94\u5f53\u77e5\u9053\u90a3\u4e9b\u4e8b\uff1f<\/li>\n<\/ul>\n<p>\u4e0b\u9762\u6211\u4f1a\u628a\u81ea\u5df1\u7684\u60f3\u6cd5\u5206\u4e3a\u73b0\u4ee3\u8ba1\u7b97\u673a\u9886\u57df\u7684\u4e00\u822c\u6027\u7684\u539f\u5219\u548c\u4e00\u4e9b\u7279\u522b\u63a8\u8350\u4e24\u90e8\u5206\u6765\u5199\u3002<\/p>\n<p><strong>\u8ba1\u7b97\u673a\u7cfb\u7684\u5b66\u751f\uff1a\u628a\u672c\u6587\u5f53\u4f5c\u81ea\u5b66\u6307\u5357\u968f\u610f\u4f7f\u7528\u3002<\/strong><\/p>\n<p><img decoding=\"async\" class=\"\" src=\"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1\" data-src=\"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/0?wx_fmt=jpeg\" data-type=\"jpeg\" data-ratio=\"0.6151079136690647\" data-w=\"\" \/><\/p>\n<p>\u4f5c\u54c1\u96c6 portfolio \uff0c\u800c\u4e0d\u662f\u7b80\u5386<\/p>\n<p>\u81ea\u4ece\u8ba1\u7b97\u673a\u79d1\u5b66\u4ece\u5de5\u7a0b\u5b66\u548c\u6570\u5b66\u5206\u79bb\u51fa\u6765\u4e4b\u540e\uff0c\u8ba1\u7b97\u673a\u7a0b\u5e8f\u884c\u4e1a\u5c31\u5f00\u59cb\u4f9d\u9760\u7b80\u5386\u6765\u96c7\u4f63\u6bd5\u4e1a\u751f\u3002<\/p>\n<p>\u4e00\u4efd<em>\u7b80\u5386<\/em>\u65e0\u6cd5\u8bf4\u660e\u7a0b\u5e8f\u5458\u7684\u80fd\u529b\u3002<\/p>\n<p>\u6bcf\u4e00\u4e2a\u8ba1\u7b97\u673a\u7cfb\u7684\u7684\u5b66\u751f\u90fd\u5e94\u5f53\u6709\u5176\u4f5c\u54c1\u96c6\u3002<\/p>\n<p>\u4e00\u4e2a\u4f5c\u54c1\u96c6\u53ef\u4ee5\u7b80\u5355\u5230\u662f\u4e00\u4e2a\u4e2a\u4eba\u535a\u5ba2\uff0c\u4e0a\u9762\u6709\u5de5\u7a0b\u6216\u5b9e\u73b0\u7684\u5e16\u5b50\u3002\u66f4\u597d\u4e9b\u7684\u8bdd\u6bcf\u4e2a\u5de5\u7a0b\u7684\u6709\u5176\u5355\u72ec\u9875\u9762\u548c\u53ef\u4f9b\u516c\u5171\u6d4f\u89c8\u7684\u4ee3\u7801\uff08\u4e5f\u8bb8\u6258\u7ba1\u5230 Github \u6216\u8005 Google Code \u4e0a\uff09\u3002<\/p>\n<p>\u5bf9\u5f00\u6e90\u4ee3\u7801\u7684\u8d21\u732e\u5e94\u5f53\u7ed9\u51fa\u94fe\u63a5\u548c\u8bf4\u660e\u3002<\/p>\n<p>\u4e00\u4e2a\u4ee3\u7801\u4f5c\u54c1\u96c6\u80fd\u591f\u4f7f\u96c7\u4e3b\u76f4\u63a5\u8bc4\u4ef7\u96c7\u5458\u7684\u80fd\u529b\u3002<\/p>\n<p>\u800c GPA \u548c\u7b80\u5386\u5374\u505a\u4e0d\u5230\u3002<\/p>\n<p>\u6559\u6388\u5e94\u8be5\u8bbe\u8ba1\u8bfe\u9898\u6765\u4f7f\u4f5c\u54c1\u96c6\u66f4\u51fa\u5f69\uff0c\u5b66\u751f\u5728\u8bfe\u7a0b\u7ed3\u675f\u65f6\u5e94\u8be5\u82b1\u4e9b\u65f6\u95f4\u66f4\u65b0\u8fd9\u4e9b\u8bfe\u7a0b\u9879\u76ee\u3002<\/p>\n<p><strong>\u793a\u4f8b<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Edward Yang\u2019s web site.\uff08http:\/\/ezyang.com\/\uff09<\/li>\n<li>Michael Bradshaw\u2019s web site. \uff08http:\/\/www.mjbshaw.com\/\uff09<\/li>\n<li>Github is my resume. \uff08http:\/\/pydanny.blogspot.com\/2011\/08\/github-is-my-resume.html\uff09<\/li>\n<\/ul>\n<p>\u6280\u672f\u4ea4\u6d41<\/p>\n<p>\u5728\u8ba1\u7b97\u673a\u79d1\u5b66\u754c\u201c\u72ec\u72fc\u201d\u5df2\u7136\u6210\u4e3a\u6fd2\u5371\u7269\u79cd\u3002<\/p>\n<p>\u5f53\u4ee3\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5fc5\u987b\u7ec3\u4e60\u4e0e\u975e\u7a0b\u5e8f\u5458\u6e05\u6670\u4e14\u6709\u8bf4\u670d\u529b\u5730\u4ea4\u6d41\u81ea\u5df1\u7684\u60f3\u6cd5\u3002<\/p>\n<p>\u5728\u5c0f\u516c\u53f8\uff0c\u7a0b\u5e8f\u5458\u80fd\u5426\u548c\u7ba1\u7406\u5c42\u4ea4\u6d41\u5979\u7684\u60f3\u6cd5\u80fd\u591f\u5f71\u54cd\u5230\u516c\u53f8\u7684\u6210\u8d25\u3002<\/p>\n<p>\u4e0d\u5e78\u7684\u662f\uff0c\u5355\u72ec\u589e\u52a0\u4e00\u4e2a\u8bfe\u7a0b\u5e76\u4e0d\u80fd\u6709\u4ec0\u4e48\u6539\u53d8\uff08\u5f53\u7136\u4e00\u4e2a\u5408\u7406\u7684\u79d1\u6280\u4ea4\u6d41\u8bfe\u7a0b\u6ca1\u6709\u574f\u5904\uff09\u3002<\/p>\n<p>\u5e94\u5f53\u63d0\u4f9b\u7ed9\u5b66\u751f\u66f4\u591a\u7684\u673a\u4f1a\u6765\u7ed9\u4e88\u4ed6\u4eec\u901a\u8fc7\u53e3\u5934\u8bb2\u6f14\u7684\u65b9\u5f0f\u5c55\u793a\u81ea\u5df1\u5de5\u4f5c\u548c\u60f3\u6cd5\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u6211\u5efa\u8bae\u5b66\u751f\u638c\u63e1\u4e00\u79cd\u6f14\u793a\u5de5\u5177\uff0c\u6bd4\u5982\u8bf4 PowerPoint \u6216\u8005\uff08\u6211\u6700\u559c\u6b22\u7684\uff09KeyNote\u3002\uff08\u62b1\u6b49\uff0c\u5c3d\u7ba1\u6211\u559c\u7231\u57fa\u4e8e LaTex \u7684\u6f14\u793a\u5de5\u5177\uff0c\u5b83\u4eec\u8fd8\u662f\u592a\u9759\u6001\u4e86\uff09\u3002<\/p>\n<p>\u4e0d\u8fc7\uff0c\u8981\u662f\u60f3\u751f\u6210\u6f02\u4eae\u7684\u6570\u5b66\u6587\u6863\uff0cLaTex \u662f\u65e0\u53ef\u6bd4\u62df\u7684\u3002\u6240\u6709\u7684\u79d1\u6280\u8bfe\u7a0b\u7684\u5199\u4f5c\u4f5c\u4e1a\u90fd\u5e94\u8be5\u4ee5 LaTex \u7684\u5f62\u5f0f\u63d0\u4ea4\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Writing for Computer Science by Zobel.<\/li>\n<li>Even a Geek Can Speak by Asher.<\/li>\n<li>The LaTeX Companion.<\/li>\n<li>The TeXbook by Knuth. (Warning: Experts only.)<\/li>\n<li>Notes on Mathematical Writing.<\/li>\n<li>Simon Peyton-Jones\u2019s advice on How to Give a Good Research Talk.<\/li>\n<li>My advice on how to send and reply to email.<\/li>\n<\/ul>\n<p>\u4e00\u9897\u5de5\u7a0b\u5b66\u7684\u5fc3<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u4e0d\u662f\u5b8c\u5168\u7684\u5de5\u7a0b\u5b66\u3002<\/p>\n<p>\u4f46\u4e5f\u5dee\u4e0d\u591a\u3002<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u7ec8\u4f1a\u53d1\u73b0\u4ed6\u4eec\u548c\u5de5\u7a0b\u5e08\u5728\u4e00\u8d77\u5de5\u4f5c\u3002\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u548c\u4f20\u7edf\u7684\u5de5\u7a0b\u5e08\u9700\u8981\u8bf4\u76f8\u540c\u7684\u8bed\u8a00\u2014\u2014\u4e00\u79cd\u624e\u6839\u4e8e\u5b9e\u5206\u6790\u3001\u7ebf\u6027\u4ee3\u6570\u3001\u6982\u7387\u8bba\u4e0e\u7269\u7406\u5b66\u7684\u8bed\u8a00\u3002<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u7406\u5e94\u638c\u63e1\u7269\u7406\u5b66\u4e2d\u7684\u7535\u78c1\u5b66\uff0c\u4f46\u8981\u8fbe\u5230\u8fd9\u4e00\u70b9\uff0c\u4ed6\u4eec\u8fd8\u9700\u638c\u63e1\u591a\u5143\u5fae\u79ef\u5206\uff0c\uff08\u5916\u52a0\u5b66\u4e60\u5fae\u5206\u65b9\u7a0b\uff09\u3002<\/p>\n<p>\u5728\u8fdb\u884c\u58f0\u97f3\u4eff\u771f\u65f6\uff0c\u7cbe\u901a\u6982\u7387\u8bba\uff08\u901a\u5e38\u8fd8\u5305\u62ec\uff09\u7ebf\u6027\u4ee3\u6570\u662f\u6781\u6709\u76ca\u5904\u7684\u3002\u5728\u8bf4\u660e\u8ba1\u7b97\u7ed3\u679c\u65f6\uff0c\u5bf9\u7edf\u8ba1\u7684\u7262\u56fa\u7406\u89e3\u662f\u65e0\u53ef\u66ff\u4ee3\u7684\u3002<\/p>\n<p><strong>\u63a8\u8350\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Spivak \u7684 Calculus<\/li>\n<li>Wasserman \u7684 All of Statistics: A Concise Course in Statistical Inference<\/li>\n<\/ul>\n<p>Unix \u54f2\u5b66<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u5f53\u4e60\u60ef\u5e76\u4e14\u719f\u7ec3\u4f7f\u7528 Unix \u54f2\u5b66\u7684\u5904\u7406\u3002<\/p>\n<p>Unix \u54f2\u5b66\uff08\u4e0d\u540c\u4e8e Unix \u672c\u8eab\uff09\u662f\u4e00\u79cd\u6ce8\u91cd\u8bed\u8a00\u5b66\u62bd\u8c61\u548c\u6574\u5408\u6765\u8fbe\u5230\u9884\u671f\u5904\u7406\u7684\u65b9\u6cd5\u3002<\/p>\n<p>\u5728\u5b9e\u8df5\u4e2d\uff0c\u8fd9\u610f\u5473\u7740\u8981\u4e60\u60ef\u4e8e\u547d\u4ee4\u884c\u5f62\u5f0f\u5904\u7406\u3001\u6587\u672c\u6587\u4ef6\u8fdb\u884c\u914d\u7f6e\u548c\u8f7b\u578bIDE\u7684\u8f6f\u4ef6\u5f00\u53d1\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u8003\u8651\u5230 Unix \u7cfb\u7edf\u7684\u6d41\u884c\u5ea6\uff0c\u5f53\u4eca\u7684\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u5f53\u719f\u7ec3\u5730\u638c\u63e1\u57fa\u672c\u7684 Unix \u80fd\u529b\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>\u6d4f\u89c8\u548c\u64cd\u4f5c\u6587\u4ef6\u7cfb\u7edf<\/li>\n<li>\u4f7f\u7528\u7ba1\u9053\u8fdb\u884c\u7ec4\u5408\u64cd\u4f5c<\/li>\n<li>\u4e60\u60ef\u4e8e\u4f7f\u7528 emacs \u548c vim \u7f16\u8f91\u6587\u4ef6<\/li>\n<li>\u65b0\u5efa\u3001\u4fee\u6539\u548c\u8fd0\u884c\u4e00\u4e2a\u8f6f\u4ef6\u9879\u76ee\u7684 Makefile \u6587\u4ef6<\/li>\n<li>\u7f16\u5199\u7b80\u5355\u7684 shell \u811a\u672c \u5b66\u751f\u5728\u4e0d\u7406\u89e3 Unix \u54f2\u5b66\u5f3a\u5927\u80fd\u529b\u65f6\u4f1a\u62b5\u5236\u5b83\u3002\u6b64\u65f6\u6700\u597d\u8ba9\u5b66\u751f\u5c1d\u8bd5\u5b8c\u6210\u4e00\u4e9b Unix \u6709\u76f8\u5bf9\u4f18\u52bf\u7684\u6709\u7528\u7684\u4efb\u52a1\uff0c\u6bd4\u5982\uff1a<\/li>\n<li>\u627e\u5230\u6307\u5b9a\u76ee\u5f55\u4e0b\u5360\u7528\u7a7a\u95f4\u6700\u5927\u76845\u4e2a\u6587\u4ef6\u5939<\/li>\n<li>\u627e\u5230\u8ba1\u7b97\u673a\u4e2d\u91cd\u590d\u7684 MP3 \u6587\u4ef6\uff08\u76f8\u540c\u7684\u6587\u4ef6\u5185\u5bb9\u800c\u4e0d\u662f\u6587\u4ef6\u540d\uff09<\/li>\n<li>\u627e\u5230\u540d\u5b57\u5217\u8868\u4e2d\u59d3\u540d\u9996\u5b57\u6bcd\u662f\u5c0f\u5199\u7684\u540d\u5b57\uff0c\u5e76\u8c03\u6574\u5927\u5c0f\u5199<\/li>\n<li>\u627e\u5230\u7b2c\u4e8c\u4e2a\u5b57\u6bcd\u662f x\uff0c\u5012\u6570\u7b2c\u4e8c\u4e2a\u662f n \u7684\u82f1\u8bed\u5355\u8bcd<\/li>\n<li>\u628a\u4f60\u7684\u624b\u673a\u7684\u58f0\u97f3\u8f93\u5165\u7ecf\u7531\u7f51\u7edc\u4f20\u9001\u5230\u53e6\u4e00\u53f0\u7535\u8111\u7684\u97f3\u54cd\u64ad\u653e<\/li>\n<li>\u628a\u6307\u5b9a\u6587\u4ef6\u5939\u4e0b\u7684\u6587\u4ef6\u540d\u4e2d\u7684\u7a7a\u683c\u66ff\u6362\u4e3a\u4e0b\u5212\u7ebf<\/li>\n<li>\u62a5\u544a\u6307\u5b9a IP \u5730\u5740\u63a5\u5165 web \u670d\u52a1\u5668\u7684\u6700\u8fd1\u5341\u4e2a\u9519\u8bef\u8fde\u63a5<\/li>\n<\/ul>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>The Unix Programming Environment by Kernighan and Pike.<\/li>\n<li>The Linux Programming Interface: A Linux and UNIX System Programming Handbook by Kerrisk.<\/li>\n<li>Unix Power Tools by Powers, Peek, O\u2019Reilly and Loukides.<\/li>\n<li>commandlinefu.<\/li>\n<li>Linux Server Hacks.<\/li>\n<li>The single Unix specification.<\/li>\n<\/ul>\n<p>\u7cfb\u7edf\u7ba1\u7406<\/p>\n<p>\u4e00\u4e9b\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5632\u7b11\u7cfb\u7edf\u7ba1\u7406\u662f\u4e00\u4ef6\u201cIT\u201d\u4efb\u52a1\u3002<\/p>\n<p>\u4ed6\u4eec\u7684\u60f3\u6cd5\u662f\u53ef\u4ee5\u81ea\u5b66\u6280\u672f\u4eba\u5458\u80fd\u505a\u5f97\u5230\u7684\u6240\u6709\u4e8b\u3002<\/p>\n<p>\u8fd9\u662f\u6b63\u786e\u7684\uff08\u55ef\uff0c\u7406\u8bba\u4e0a\u662f\uff09\u3002<\/p>\n<p>\u7136\u800c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u80fd\u591f\u5b8c\u5168\u4e14\u5b89\u5168\u5730\u63a7\u5236\u4ed6\u4eec\u7684\u7cfb\u7edf\u548c\u7f51\u7edc\u7684\u6001\u5ea6\u662f\u6709\u4e9b\u8bef\u5bfc\u4eba\u7684\u3002<\/p>\n<p>\u8f6f\u4ef6\u5f00\u53d1\u4e2d\u5f88\u591a\u4efb\u52a1\u4e0d\u4f20\u7ed9\u7cfb\u7edf\u7ba1\u7406\u5458\u6765\u505a\u662f\u6700\u9ad8\u6548\u7684\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u6bcf\u4e2a\u5f53\u4ee3\u7684\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u5f53\u80fd\u591f\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>\u5b89\u88c5\u548c\u7ba1\u7406\u4e00\u4e2a Linux \u53d1\u884c\u7248<\/li>\n<li>\u914d\u7f6e\u548c\u7f16\u8bd1 Linux \u5185\u6838<\/li>\n<li>\u4f7f\u7528 dig\u3001ping \u548c traceroute \u547d\u4ee4\u6765\u6392\u89e3\u6545\u969c<\/li>\n<li>\u7f16\u8bd1\u548c\u914d\u7f6e web \u670d\u52a1\u5668\uff0c\u6bd4\u5982 apache<\/li>\n<li>\u7f16\u8bd1\u548c\u914d\u7f6e DNS \u5b88\u62a4\u8fdb\u7a0b\uff0c\u6bd4\u5982 bind<\/li>\n<li>\u4f7f\u7528\u6587\u672c\u7f16\u8f91\u5668\u7ef4\u62a4\u4e00\u4e2a\u7ad9\u70b9<\/li>\n<li>\u81ea\u5df1\u5236\u4f5c\u6c34\u6676\u5934<\/li>\n<\/ul>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>UNIX and Linux System Administration Handbook by Nemeth, Synder, Hein and Whaley.<\/li>\n<\/ul>\n<p>\u7f16\u7a0b\u8bed\u8a00<\/p>\n<p>\u7f16\u7a0b\u8bed\u8a00\u6709\u5468\u671f\u7684\u5174\u8d77\u4e0e\u8870\u843d\u3002<\/p>\n<p>\u800c\u4e00\u4e2a\u7a0b\u5e8f\u5458\u7684\u804c\u4e1a\u4e0d\u5e94\u5982\u6b64\u3002<\/p>\n<p>\u5c3d\u7ba1\u6559\u6388\u4e0e\u83b7\u5f97\u5de5\u4f5c\u76f8\u5173\u7684\u8bed\u8a00\u5f88\u91cd\u8981\uff0c\u5b66\u751f\u80fd\u591f\u81ea\u5b66\u65b0\u7684\u7f16\u7a0b\u8bed\u8a00\u4e5f\u540c\u7b49\u91cd\u8981\u3002<\/p>\n<p>\u5b66\u4e60\u600e\u6837\u5b66\u4e60\u65b0\u7684\u7f16\u7a0b\u8bed\u8a00\u7684\u6700\u597d\u65b9\u5f0f\u662f\u5b66\u4e60\u591a\u79cd\u7f16\u7a0b\u8bed\u8a00\u548c\u7f16\u7a0b\u8303\u5f0f\u3002<\/p>\n<p>\u5b66\u4e60\u7b2cn\u4e2a\u8bed\u8a00\u7684\u96be\u5ea6\u662f\u7b2c(n \u2013 1)\u4e2a\u7684\u4e00\u534a\u3002<\/p>\n<p>\u7136\u800c\uff0c\u8981\u60f3\u771f\u6b63\u7406\u89e3\u7f16\u7a0b\u8bed\u8a00\uff0c\u5e94\u8be5\u81ea\u5df1\u5b9e\u73b0\u4e00\u4e2a\u3002\u7406\u60f3\u60c5\u51b5\u4e0b\uff0c\u6bcf\u4e2a\u8ba1\u7b97\u673a\u79d1\u5b66\u7cfb\u7684\u5b66\u751f\u90fd\u53c2\u52a0\u8fc7\u7f16\u8bd1\u7684\u8bfe\u7a0b\u3002\u81f3\u5c11\uff0c\u6bcf\u4e2a\u5b66\u751f\u5e94\u8be5\u5b9e\u73b0\u4e00\u4e2a\u89e3\u91ca\u5668\u3002<\/p>\n<p><strong>\u4e00\u4e9b\u8bed\u8a00<\/strong><\/p>\n<p>\u4e0b\u9762\u7684\u7f16\u7a0b\u8bed\u8a00\u6db5\u76d6\u4e86\u7f16\u7a0b\u8303\u5f0f\u548c\u5b9e\u9645\u5e94\u7528\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Racket<\/li>\n<li>C<\/li>\n<li>Javascript<\/li>\n<li>Squeak<\/li>\n<li>Java<\/li>\n<li>Standard ML<\/li>\n<li>Prolog<\/li>\n<li>Scala<\/li>\n<li>Haskell<\/li>\n<li>C++ \u548c<\/li>\n<li>\u6c47\u7f16<\/li>\n<\/ul>\n<p><strong>Racket<\/strong><\/p>\n<p>Racket\uff0c\u4f5c\u4e3a\u529f\u80fd\u5168\u9762\u7684 Lisp \u7684\u65b9\u8a00\uff0c\u6709\u7740\u6781\u7b80\u5355\u7684\u8bed\u6cd5\u3002<\/p>\n<p>\u5bf9\u5c11\u90e8\u5206\u7684\u5b66\u751f\u6765\u8bf4\uff0c\u8fd9\u79cd\u8bed\u6cd5\u662f\u4e00\u79cd\u5b66\u4e60\u969c\u788d\u3002<\/p>\n<p>\u4e0d\u8fc7\u5766\u7387\u5730\u8bb2\uff0c\u5982\u82e5\u4e00\u4e2a\u5b66\u751f\u89c9\u5f97\u5373\u4f7f\u662f\u6682\u65f6\u63a5\u53d7\u4e00\u79cd\u76f8\u5f02\u7684\u8bed\u6cd5\u89c4\u5219\u4e5f\u662f\u5f88\u5927\u7684\u8111\u529b\u969c\u788d\u7684\u8bdd\uff0c\u4ed6\u7f3a\u4e4f\u4ece\u4e8b\u8ba1\u7b97\u673a\u79d1\u5b66\u804c\u4e1a\u7684\u7075\u5de7\u5fc3\u667a\u3002<\/p>\n<p>Racket \u4e30\u5bcc\u7684\u5b8f\u7cfb\u7edf\u548c\u9ad8\u9636\u7f16\u7a0b\u7ec4\u4ef6\u5f7b\u5e95\u6253\u7834\u4e86\u6570\u636e\u548c\u4ee3\u7801\u7684\u5206\u522b\u3002<\/p>\n<p>\u5982\u679c\u6559\u7684\u5408\u7406\uff0c\u80fd\u591f\u5145\u5206\u53d1\u6325 Lisp \u7684\u80fd\u529b\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>How to Design Programs by Felleisen, Findler, Flatt and Krishnamurthi.<\/li>\n<li>The Racket Docs.<\/li>\n<\/ul>\n<p><strong>ANSI C<\/strong><\/p>\n<p>C \u662f\u5bf9\u5e95\u5c42\uff08\u7845\uff09\u7684\u7b80\u6d01\u81f3\u6781\u7684\u62bd\u8c61\u3002<\/p>\n<p>C \u5728\u5d4c\u5165\u5f0f\u7cfb\u7edf\u7684\u7f16\u7a0b\u4e2d\u65e0\u53ef\u66ff\u4ee3\u3002<\/p>\n<p>\u5b66\u4e60 C \u80fd\u63d0\u4f9b\u5bf9\u51af\u00b7\u8bfa\u4f9d\u66fc\u4f53\u7cfb\u7684\u6df1\u5165\u7406\u89e3\uff0c\u5176\u7a0b\u5ea6\u6ca1\u6709\u5176\u4ed6\u8bed\u8a00\u80fd\u5339\u62df\u3002<\/p>\n<p>\u8003\u8651\u5230\u5dee\u7684 C \u7f16\u7801\u4e0e\u666e\u904d\u7684\u7f13\u51b2\u533a\u6ea2\u51fa\u5b89\u5168\u9690\u60a3\u6709\u7740\u4eb2\u5bc6\u7684\u5173\u7cfb\uff0c\u7a0b\u5e8f\u5458\u5b66\u4e60\u6b63\u786e\u5730\u7f16\u5199 C \u7a0b\u5e8f\u662f\u5f88\u91cd\u8981\u7684\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>ANSI C by Kernighan and Ritchie.<\/li>\n<\/ul>\n<p><strong>Javascript<\/strong><\/p>\n<p>Javascript\u662f\u52a8\u6001\u3001\u9ad8\u7ea7\u8bed\u8a00\u6bd4\u5982 Python\u3001Ruby \u548c Perl \u7684\u8bed\u4e49\u6a21\u578b\u7684\u5f88\u597d\u7684\u4e00\u4e2a\u4ee3\u8868\u3002<\/p>\n<p>\u4f5c\u4e3a web \u539f\u751f\u8bed\u8a00\uff0c\u5b83\u7684\u5b9e\u7528\u6027\u4f18\u52bf\u662f\u72ec\u4e00\u65e0\u4e8c\u7684\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>JavaScript: The Definitive Guide by Flanagan.<\/li>\n<li>JavaScript: The Good Parts by Crockford.<\/li>\n<li>Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript by Herman.<\/li>\n<\/ul>\n<p><strong>Squeak<\/strong><\/p>\n<p>Squeak \u662f\u6700\u7eaf\u6b63\u7684\u9762\u5411\u5bf9\u8c61\u8bed\u8a00 Smalltalk \u7684\u73b0\u4ee3\u65b9\u8a00\uff0c\u5b83\u5c55\u73b0\u4e86\u201c\u9762\u5411\u5bf9\u8c61\u201d\u7684\u672c\u8d28\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Introductions to Squeak<\/li>\n<\/ul>\n<p><strong>Java<\/strong><\/p>\n<p>Java \u5c06\u4fdd\u6301\u6d41\u884c\u4e45\u5230\u65e0\u6cd5\u5c06\u5176\u5ffd\u7565\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Effective Java by Bloch.<\/li>\n<\/ul>\n<p><strong>Standard ML<\/strong><\/p>\n<p>Standard ML \u662f Hindley-Milner \u7cfb\u7edf\u7684\u4e00\u4e2a\u5e72\u51c0\u5b9e\u73b0\u3002<\/p>\n<p>Hindley-Milner \u7c7b\u578b\u7cfb\u7edf\u662f\u73b0\u4ee3\u8ba1\u7b97\u8ba1\u7b97\u673a\u9886\u57df\u6700\u4f1f\u5927\uff08\u7136\u800c\u5374\u662f\u6700\u4e0d\u77e5\u540d\uff09\u7684\u6210\u5c31\u3002<\/p>\n<p>\u5c3d\u7ba1\u6709\u7740\u6307\u6570\u7ea7\u7684\u590d\u6742\u6027\uff0cHindley-Milner \u7684\u7c7b\u578b\u63a8\u65ad\u5bf9\u4e8e\u6b63\u5e38\u7684\u7a0b\u5e8f\u6765\u8bf4\u662f\u8db3\u591f\u5feb\u7684\u3002<\/p>\n<p>\u7c7b\u578b\u7cfb\u7edf\u652f\u6301\u590d\u6742\u7684\u7ed3\u6784\u5316\u4e0d\u53d8\u91cf\u8868\u8fbe\uff0c\u4e8b\u5b9e\u4e0a\uff0c\u5b83\u4e30\u5bcc\u5230\u7c7b\u578b\u5b9a\u4e49\u826f\u597d\u7684\u7a0b\u5e8f\u7ecf\u5e38\u662f\u6ca1\u6709 bug \u7684\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>ML for the Working Programmer by Paulson.<\/li>\n<li>The Definition of Standard ML by Milner, Harper, MacQueen and Tofte.<\/li>\n<\/ul>\n<p><strong>Prolog<\/strong><\/p>\n<p>\u5c3d\u7ba1\u5728\u5e94\u7528\u4e0a\u5360\u6709\u4e00\u5e2d\u4e4b\u5730\uff0c\u903b\u8f91\u7f16\u7a0b\u662f\u8ba1\u7b97\u601d\u7ef4\u7684\u53e6\u4e00\u79cd\u8303\u5f0f\u3002<\/p>\n<p>\u5728\u7a0b\u5e8f\u5458\u9700\u8981\u5728\u5176\u4ed6\u7f16\u7a0b\u8303\u5f0f\u91cc\u6a21\u62df\u903b\u8f91\u7f16\u7a0b\u65f6\uff0c\u7406\u89e3\u903b\u8f91\u7f16\u7a0b\u662f\u503c\u5f97\u7684\u3002<\/p>\n<p>\u53e6\u4e00\u79cd\u503c\u5f97\u5b66\u4e60\u7684\u903b\u8f91\u7f16\u7a0b\u8bed\u8a00\u662fminiKanren\u3002miniKanren\u5f3a\u8c03\u7eaf\u7cb9\u7684\u903b\u8f91\u7f16\u7a0b\u3002\u8fd9\u4e2a\u7ea6\u675f\u9010\u6b65\u5f62\u6210\u4e86\u53e6\u4e00\u79cd\u98ce\u683c\u7684\u903b\u8f91\u7f16\u7a0b\u79f0\u4e3a\u5173\u7cfb\u7a0b\u5e8f\u8bbe\u8ba1\uff0c\u5e76\u4e14\u5b83\u6388\u4e88\u901a\u5e38Prolog\u7a0b\u5e8f\u4e0d\u652f\u6301\u7684\u5c5e\u6027\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Prolog Tutorial.<\/li>\n<li>Another tutorial.<\/li>\n<\/ul>\n<p><strong>Scala<\/strong><\/p>\n<p>Scala \u662f\u5b9a\u4e49\u826f\u597d\u7684\u51fd\u6570\u5f0f\u4e0e\u9762\u5411\u5bf9\u8c61\u7684\u878d\u5408\u8bed\u8a00\u3002<\/p>\n<p>Scala \u662f Java \u5e94\u8be5\u505a\u5230\u7684\u6837\u5b50\u3002<\/p>\n<p>\u5efa\u7acb\u4e8e Java \u865a\u62df\u673a\u4e4b\u4e0a\uff0c\u5e76\u517c\u5bb9\u73b0\u5b58\u7684 Java \u4ee3\u7801\u5e93\uff0cScala \u6700\u6709\u53ef\u80fd\u6210\u4e3a Java \u7684\u540e\u7ee7\u8005\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Programming in Scala by Odersky, Spoon and Venners.<\/li>\n<li>Programming Scalaby Wampler and Payne.<\/li>\n<\/ul>\n<p><strong>Haskell<\/strong><\/p>\n<p>Haskell \u662f Hindley-Milner \u8bed\u8a00\u5bb6\u65cf\u7684\u738b\u51a0\u3002<\/p>\n<p>\u5145\u5206\u5229\u7528\u60f0\u6027\u6c42\u503c\uff0cHaskell \u662f\u4e3b\u6d41\u7f16\u7a0b\u8bed\u8a00\u4e2d\u6700\u63a5\u8fd1\u4e8e\u7eaf\u6570\u5b66\u7684\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Learn You a Haskell by Lipovaca.<\/li>\n<li>Real World Haskell by O\u2019Sullivan, Goerzen and Stewart.<\/li>\n<\/ul>\n<p><strong>\u6807\u51c6 C++<\/strong><\/p>\n<p>C++ \u662f\u65e0\u6cd5\u907f\u514d\u7684\u707e\u7978\u3002<\/p>\n<p>\u4f46\u662f\u65e2\u7136\u5fc5\u987b\u8981\u6559 C++\uff0c\u90a3\u5c31\u6559\u5168\u3002<\/p>\n<p>\u7279\u522b\u5730\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u7cfb\u7684\u5b66\u751f\u6bd5\u4e1a\u65f6\u5e94\u8be5\u638c\u63e1\u6a21\u677f\u5143\u7f16\u7a0b.<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>The C++ Programming Language by Stroustrup.<\/li>\n<li>C++ Templates: The Complete Guide by Vandevoorde and Josuttis.<\/li>\n<li>Programming Pearls by Bentley.<\/li>\n<\/ul>\n<p><strong>\u6c47\u7f16<\/strong><\/p>\n<p>\u4efb\u4f55\u6c47\u7f16\u8bed\u8a00\u90fd\u884c\u3002<\/p>\n<p>\u65e2\u7136 x86 \u5f88\u6d41\u884c\uff0c\u6700\u597d\u5b66\u5b83\u3002<\/p>\n<p>\u5b66\u4e60\u7f16\u8bd1\u5668\u7684\u6700\u597d\u65b9\u5f0f\u4fbf\u662f\u5b66\u4e60\u6c47\u7f16\uff0c\u56e0\u4e3a\u6c47\u7f16\u76f4\u89c2\u5730\u5c55\u793a\u4e86\u5c06\u9ad8\u7ea7\u4ee3\u7801\u8f6c\u5316\u4e3a\u4f4e\u7ea7\u4ee3\u7801\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u7406\u89e3\u4ea7\u751f\u5f0f\u7f16\u7a0b\uff08\u5b8f\u7f16\u7a0b\uff09\uff1b\u8bcd\u6cd5\uff08\u52a8\u6001\uff09\u8303\u56f4\uff1b\u95ed\u5305\uff1bcontinuation\uff1b\u9ad8\u9636\u51fd\u6570\uff1b\u52a8\u6001\u8c03\u5ea6\uff1b\u5b50\u7c7b\u578b\uff1b\u6a21\u5757\u548c\u51fd\u5b50\u8fd8\u6709\u4e0d\u540c\u4e8e\u5176\u4ed6\u7279\u5b9a\u8bed\u6cd5\u7684 monads \u8bed\u4e49\u6982\u5ff5\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Structure and Interpretation of Computer Programs by Abelson, Sussman and Sussman.<\/li>\n<li>Lisp in Small Pieces by Queinnec.<\/li>\n<\/ul>\n<p>\u79bb\u6563\u6570\u5b66<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5fc5\u987b\u8981\u5bf9\u5f62\u5f0f\u903b\u8f91\u53ca\u5176\u8bc1\u660e\u6709\u7262\u56fa\u7684\u7406\u89e3\u3002\u4ee3\u6570\u64cd\u4f5c\u548c\u81ea\u7136\u63a8\u7406\u8bc1\u660e\u662f\u5904\u7406\u4f8b\u7a0b\u4efb\u52a1\u7684\u6709\u529b\u65b9\u6cd5\uff0c\u5f52\u7eb3\u603b\u7ed3\u8bc1\u660e\u5728\u6784\u5efa\u9012\u5f52\u51fd\u6570\u65f6\u5f88\u6709\u7528\u5904\u3002<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5fc5\u987b\u5bf9\u5f62\u5f0f\u6570\u5b66\u8bb0\u53f7\u5f88\u719f\u6089\uff0c\u5e76\u4e14\u5bf9\u57fa\u672c\u7684\u79bb\u6563\u6570\u5b66\u7ed3\u6784\u2013\u96c6\u5408\u3001\u5143\u7ec4\u3001\u961f\u5217\u3001\u65b9\u6cd5\u548c\u5e42\u96c6\u80fd\u8fdb\u884c\u7684\u4e25\u683c\u63a8\u7406\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<p>\u5bf9\u4e8e\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\uff0c\u638c\u63e1\u8fd9\u4e9b\u7406\u8bba\u5f88\u91cd\u8981\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>\u6811\uff1b<\/li>\n<li>\u56fe\uff1b<\/li>\n<li>\u5f62\u5f0f\u8bed\u8a00\uff1b\u548c<\/li>\n<li>\u81ea\u52a8\u673a \u5b66\u751f\u5e94\u8be5\u5b66\u4e60\u8db3\u591f\u591a\u7684\u6570\u8bba\u77e5\u8bc6\u6765\u7814\u7a76\u548c\u5b9e\u73b0\u57fa\u672c\u7684\u52a0\u5bc6\u534f\u8bae\u3002<\/li>\n<\/ul>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>How to Prove It: A Structured Approach by Velleman.<\/li>\n<li>How To Solve It by Polya.<\/li>\n<\/ul>\n<p>\u6570\u636e\u7ed3\u6784\u548c\u7b97\u6cd5<\/p>\n<p>\u5b66\u751f\u5e94\u8be5\u5fc5\u987b\u89c1\u8fc7\u5e38\u89c1\uff08\u6216\u8005\u7f55\u89c1\u4f46\u5f02\u5e38\u6709\u6548\u7684\uff09\u6570\u636e\u7ed3\u6784\u548c\u7b97\u6cd5\u3002\u4f46\u662f\uff0c\u6bd4\u8d77\u77e5\u9053\u7279\u5b9a\u7b97\u6cd5\u548c\u6570\u636e\u7ed3\u6784\uff08\u8fd9\u4e9b\u7ecf\u5e38\u662f\u5f88\u5bb9\u6613\u67e5\u9605\u5230\u7684\uff09\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u7406\u89e3\u77e5\u9053\u5982\u4f55\u53bb\u8bbe\u8ba1\u7b97\u6cd5\uff08\u6bd4\u5982\u8d2a\u5fc3\u3001\u52a8\u6001\u89c4\u5212\u7b56\u7565\u7b49\uff09\u5e76\u4e14\u77e5\u9053\u5982\u4f55\u5c06\u7406\u60f3\u4e2d\u7684\u7b97\u6cd5\u771f\u6b63\u5b9e\u73b0\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u5bf9\u4e8e\u60f3\u83b7\u5f97\u957f\u671f\u96c7\u4f63\u5173\u7cfb\u7684\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u6765\u8bf4\u81f3\u5c11\u8981\u77e5\u9053\u8fd9\u4e9b\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>\u54c8\u5e0c\u8868\uff1b<\/li>\n<li>\u94fe\u8868\uff1b<\/li>\n<li>\u6570\uff1b<\/li>\n<li>\u4e8c\u5206\u67e5\u627e\u6811\uff1b\u548c<\/li>\n<li>\u6709\u5411\u3001\u65e0\u5411\u56fe \u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u53ef\u4ee5\u5b9e\u73b0\u6216\u8005\u6269\u5c55\u64cd\u4f5c\u8fd9\u4e9b\u6570\u636e\u7ed3\u6784\u7684\u7b97\u6cd5\uff0c\u5305\u62ec\u589e\u5220\u6539\u67e5\u7279\u5b9a\u5143\u7d20\u3002\u8003\u8651\u5230\u5b8c\u5907\u6027\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u77e5\u9053\u6bcf\u4e2a\u7b97\u6cd5\u7684\u6307\u4ee4\u5f0f\u548c\u51fd\u6570\u5f0f\u5b9e\u73b0\u3002<\/li>\n<\/ul>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>CLRS.<\/li>\n<li>Any of the Art of Computer Programming series by Knuth.<\/li>\n<\/ul>\n<p>\u7406\u8bba<\/p>\n<p>\u7406\u89e3\u7406\u8bba\u662f\u5728\u7814\u7a76\u751f\u9662\u8fdb\u884c\u7814\u7a76\u7684\u5148\u51b3\u6761\u4ef6\u3002\u5f53\u80fd\u63d0\u4f9b\u4e86\u4e00\u4e2a\u95ee\u9898\u7684hard boundaries\uff08\u6216\u8005\u662f\u63d0\u4f9b\u8f6c\u5316\u4e3a\u6700\u521d\u662fhard boundaries\u7684\u65b9\u6cd5\uff09 \u65f6\u7406\u8bba\u662f\u65e0\u4ef7\u7684\u3002<\/p>\n<p>\u8ba1\u7b97\u590d\u6742\u5ea6\u53ef\u4ee5\u8bf4\u662f\u6240\u6709\u8ba1\u7b97\u673a\u201c\u79d1\u5b66\u201d\u7684\u771f\u6b63\u7684\u9884\u6d4b\u7406\u8bba\u4e4b\u4e00\u3002<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5fc5\u987b \u77e5\u9053\u6613\u5904\u7406\u6027\u548c\u53ef\u8ba1\u7b97\u6027\u7684\u7a0b\u5ea6\uff0c\u5982\u679c\u5ffd\u7565\u4e86\u8fd9\u4e9b\u9650\u5236\uff0c\u6700\u597d\u7684\u60c5\u51b5\u662f\u6709\u4e9b\u632b\u6298\uff0c\u6700\u5dee\u7684\u60c5\u51b5\u662f\u5bfc\u81f4\u5931\u8d25\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u5728\u672c\u79d1\u9636\u6bb5\uff0c\u7406\u8bba\u81f3\u5c11\u5e94\u6db5\u76d6\u8ba1\u7b97\u6a21\u578b\u548c\u8ba1\u7b97\u590d\u6742\u5ea6\u3002<\/p>\n<p>\u8ba1\u7b97\u6a21\u578b\u5e94\u8be5\u5305\u62ec\u6709\u9650\u72b6\u6001\u81ea\u52a8\u673a\u3001\u6b63\u5219\u8bed\u8a00\uff08\u548c\u6b63\u5219\u8868\u8fbe\u5f0f\uff09\u3001\u4e0b\u63a8\u81ea\u52a8\u673a\u3001\u4e0a\u4e0b\u6587\u65e0\u5173\u8bed\u8a00\u3001\u5f62\u5f0f\u6587\u6cd5\u3001\u56fe\u7075\u673a\u3001lambda \u6f14\u7b97\u548c\u4e0d\u53ef\u5224\u5b9a\u6027\u3002<\/p>\n<p>\u5728\u672c\u79d1\u9636\u6bb5\uff0c\u5b66\u751f\u81f3\u5c11\u8981\u5b66\u4e60\u8db3\u591f\u590d\u6742\u7684\u77e5\u8bc6\u6765\u7406\u89e3 P\u3001NP\u3001NP-Hard \u548c NP-Complete \u7684\u533a\u522b\u3002<\/p>\n<p>\u4e3a\u4e86\u9632\u6b62\u7559\u4e0b\u9519\u8bef\u7684\u5370\u8c61\uff0c\u5b66\u751f\u5e94\u8be5\u901a\u8fc7\u5c06\u4e00\u4e9b NP \u7684\u95ee\u9898\u89c4\u7ea6\u5230 SAT\uff08Boolean satisfiability problem\uff0c\u5e03\u5c14\u53ef\u6ee1\u8db3\u6027\u95ee\u9898\uff09\u5e76\u4f7f\u7528 SAT \u6c42\u89e3\u7a0b\u5e8f\u6c42\u89e3\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Introduction to the Theory of Computation by Sipser.<\/li>\n<li>Computational Complexity by Papadimitriou.<\/li>\n<li>Algorithms by Sedgewick and Wayne.<\/li>\n<li>Introduction to Algorithms by Cormen, Leiserson, Rivest and Stein.<\/li>\n<\/ul>\n<p>\u67b6\u6784<\/p>\n<p>\u5bf9\u8f6f\u4ef6\u67b6\u6784\u6709\u89c1\u8bc6\u7684\u7406\u89e3\u662f\u65e0\u53ef\u66ff\u4ee3\u7684\u3002<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u4ece\u6676\u4f53\u7ba1\u8d77\u7406\u89e3\u4e00\u4e2a\u8ba1\u7b97\u673a\u3002<\/p>\n<p>\u67b6\u6784\u7684\u7406\u89e3\u5305\u542b\u4e00\u4e9b\u6807\u51c6\u7684\u62bd\u8c61\uff1a\u6676\u4f53\u7ba1\u3001\u903b\u8f91\u95e8\u3001\u52a0\u6cd5\u5668\u3001\u591a\u8def\u590d\u7528\u5668\u3001\u89e6\u53d1\u5668\u3001\u7b97\u672f\u903b\u8f91\u5355\u5143\u3001\u63a7\u5236\u5355\u5143\u3001\u7f13\u5b58\u548c\u968f\u673a\u5b58\u53d6\u5b58\u50a8\u5668\u3002<\/p>\n<p>\u5bf9\u9ad8\u6027\u80fd\u8ba1\u7b97 GPU \u6a21\u578b\u7684\u7406\u89e3\u5728\u53ef\u9884\u77e5\u7684\u672a\u6765\u662f\u5f88\u91cd\u8981\u7684\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u8981\u60f3\u5728\u73b0\u4ee3\u7cfb\u7edf\u4e0a\u8fbe\u5230\u9ad8\u6027\u80fd\u5bf9\u7f13\u5b58\u3001\u603b\u7ebf\u548c\u7269\u7406\u5185\u5b58\u7ba1\u7406\u7684\u7406\u89e3\u662f\u5f88\u91cd\u8981\u7684\u3002<\/p>\n<p>\u8981\u60f3\u7406\u89e3\u673a\u5668\u67b6\u6784\uff0c\u5b66\u751f\u5e94\u8be5\u8bbe\u8ba1\u548c\u4eff\u771f\u4e00\u4e2a\u5c0f\u7684 CPU\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>nand2tetris, which constructs a computer from the ground up.<\/li>\n<li>Computer Organization and Design by Patterson and Hennessy.<\/li>\n<li>\u201cWhat every programmer should know about memory\u201d by Drepper.<\/li>\n<\/ul>\n<p>\u64cd\u4f5c\u7cfb\u7edf<\/p>\n<p>\u4efb\u4f55\u8db3\u591f\u5927\u7684\u7a0b\u5e8f\u6700\u7ec8\u90fd\u5c06\u6210\u4e3a\u4e00\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u3002<\/p>\n<p>\u6b63\u56e0\u5982\u6b64\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u77e5\u9053\u5185\u6838\u662f\u5982\u4f55\u5904\u7406\u7cfb\u7edf\u8c03\u7528\u3001\u5206\u9875\u3001\u8c03\u5ea6\u3001\u4e0a\u4e0b\u6587\u5207\u6362\u3001\u6587\u4ef6\u7cfb\u7edf\u548c\u5185\u90e8\u8d44\u6e90\u7ba1\u7406\u7684\u3002<\/p>\n<p>\u5bf9\u64cd\u4f5c\u7cfb\u7edf\u7684\u7406\u89e3\u4ec5\u6b21\u4e8e\u5bf9\u7f16\u8bd1\u5668\u548c\u5b9e\u73b0\u9ad8\u6027\u80fd\u7684\u67b6\u6784\u7684\u7406\u89e3\u3002<\/p>\n<p>\u7406\u89e3\u64cd\u4f5c\u7cfb\u7edf\uff08\u6211\u60f3\u5f53\u7136\u4e5f\u5305\u62ec\u8fd0\u884c\u65f6\u7684\u7cfb\u7edf\uff09\u5728\u5bf9\u5d4c\u5165\u5f0f\u7cfb\u7edf\u8fdb\u884c\u7f16\u7a0b\u662f\u975e\u5e38\u91cd\u8981\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u5b66\u751f\u5fc5\u987b\u5728\u4e00\u4e2a\u771f\u6b63\u7684\u64cd\u4f5c\u7cfb\u7edf\u4e0a\u52a8\u624b\u5b9e\u8df5\uff0c\u5728 Linux \u548c\u865a\u62df\u5316\u6280\u672f\u7684\u5e2e\u52a9\u4e0b\uff0c\u8fd9\u6bd4\u4e4b\u524d\u5bb9\u6613\u4e9b\u3002\u60f3\u8981\u5bf9\u5185\u6838\u6709\u5f88\u597d\u7684\u7406\u89e3\uff0c\u5b66\u751f\u5e94\u8be5\uff1a<\/p>\n<p>\u5728\u542f\u52a8\u8fc7\u7a0b\u4e2d\u8f93\u51fa \u201chello world\u201d\uff1b<\/p>\n<p>\u8bbe\u8ba1\u4ed6\u4eec\u81ea\u5df1\u7684\u8c03\u5ea6\u5668\uff1b<\/p>\n<p>\u4fee\u6539\u5206\u9875\u7b56\u7565\uff1b<\/p>\n<p>\u521b\u5efa\u4ed6\u4eec\u81ea\u5df1\u7684\u6587\u4ef6\u7cfb\u7edf<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Linux Kernel Development by Love.<\/li>\n<\/ul>\n<p>\u7f51\u7edc<\/p>\n<p>\u8003\u8651\u5230\u7f51\u7edc\u7684\u666e\u904d\u6027\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u5bf9\u7f51\u7edc\u6808\u548c\u7f51\u7edc\u4e2d\u7684\u8def\u7531\u534f\u8bae\u6709\u575a\u5b9e\u7684\u7406\u89e3\u3002<\/p>\n<p>\u5bf9\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u6765\u8bf4\uff0c\u5728\u4e0d\u53ef\u9760\u4f20\u8f93\u534f\u8bae\uff08\u6bd4\u5982 IP\uff09\u7684\u57fa\u7840\u4e0a\u6784\u5efa\u53ef\u9760\u7684\u4f20\u8f93\u534f\u8bae\uff08\u6bd4\u5982 TCP\uff09\u7684\u673a\u5236\u4e0d\u5e94\u662f\u4e0d\u53ef\u601d\u8bae\u7684\u800c\u5e94\u662f\u6838\u5fc3\u77e5\u8bc6\u3002<\/p>\n<p>\u4ed6\u4eec\u5e94\u8be5\u7406\u89e3\u5728\u534f\u8bae\u8bbe\u8ba1\u4e2d\u7684\u6743\u8861\u2014\u6bd4\u5982\uff0c\u4ec0\u4e48\u65f6\u5019\u9009\u62e9 TCP\uff0c\u4ec0\u4e48\u65f6\u5019\u9009\u62e9 UDP\u3002\uff08\u7a0b\u5e8f\u5458\u9700\u8981\u77e5\u9053\u5728\u5927\u578b\u7f51\u7edc\u4e2d\u6709\u963b\u585e\uff0c\u4ed6\u4eec\u4e5f\u5e94\u66f4\u5927\u89c4\u6a21\u5730\u4f7f\u7528 UDP\u3002\uff09<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u8003\u8651\u5230\u5f53\u4ee3\u7a0b\u5e8f\u5458\u8fdb\u884c\u7f51\u7edc\u7f16\u7a0b\u7684\u9891\u7e41\u6027\uff0c\u7406\u89e3\u73b0\u5b58\u534f\u8bae\u6807\u51c6\u662f\u6709\u7528\u7684\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>802.3 \u548c802.11;<\/li>\n<li>IPv4 \u548c IPv6;<\/li>\n<li>DNS, SMTP \u548cHTTP. \u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u7406\u89e3\u5305\u51b2\u7a81\u65f6\u7684\u6307\u6570\u56de\u9000\u548c\u5728\u62e5\u585e\u63a7\u5236\u4e2d\u7684\u52a0\u6cd5\u589e\u5927\u548c\u4e58\u6cd5\u51cf\u5c11\u673a\u5236\u3002\u6bcf\u4e2a\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u5b9e\u73b0\uff1a<\/li>\n<li>\u4e00\u4e2a HTTP \u7684\u5ba2\u6237\u7aef\u548c\u5b88\u62a4\u8fdb\u7a0b\uff1b<\/li>\n<li>\u4e00\u4e2a DNS \u89e3\u6790\u5668\u548c\u670d\u52a1\u5668\uff1b\u4ee5\u53ca<\/li>\n<li>\u4e00\u4e2a\u547d\u4ee4\u884c\u7684 SMTP \u7684\u90ae\u4ef6\u7a0b\u5e8f \u8981\u60f3\u901a\u8fc7\u7f51\u7edc\u4ecb\u7ecd\u8bfe\u7a0b\uff0c\u6bcf\u4e2a\u5b66\u751f\u90fd\u5e94\u8be5\u4f7f\u7528wireshark\u6765\u55c5\u63a2\u4ed6\u4eec\u5bfc\u5e08\u7684\u8c37\u6b4c\u641c\u7d22\u3002<\/li>\n<\/ul>\n<p>\u4e5f\u8bb8\u8981\u6c42\u6bcf\u4e2a\u5b66\u751f\u57fa\u4e8e IP \u6765\u4ece\u5934\u5b9e\u73b0\u4e00\u4e2a\u53ef\u9760\u7684\u4f20\u8f93\u534f\u8bae\u662f\u6709\u4e9b\u5f3a\u4eba\u6240\u96be\u4e86\uff0c\u4f46\u53ef\u4ee5\u8bf4\u8fd9\u662f\u6211\u5b66\u751f\u65f6\u4ee3\u7684\u4e00\u4e2a\u5bf9\u6211\u4e2a\u4eba\u6539\u53d8\u5f88\u5927\u7684\u7ecf\u5386\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Unix Network Programming by Stevens, Fenner and Rudoff.<\/li>\n<\/ul>\n<p>\u5b89\u5168<\/p>\n<p>\u4e00\u4e2a\u60b2\u4f24\u7684\u4e8b\u5b9e\u662f\u5927\u591a\u6570\u5b89\u5168\u6f0f\u6d1e\u90fd\u6765\u6e90\u4e8e\u7c97\u5fc3\u7684\u7f16\u7801\uff0c\u66f4\u60b2\u54c0\u7684\u4e8b\u5b9e\u662f\u5f88\u591a\u5b66\u6821\u5728\u8bad\u7ec3\u7a0b\u5e8f\u5458\u7f16\u5199\u5b89\u5168\u4ee3\u7801\u4e0a\u505a\u7684\u5f88\u5dee\u3002<\/p>\n<p>\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5fc5\u987b\u77e5\u9053\u7a0b\u5e8f\u88ab\u653b\u7834\u7684\u65b9\u5f0f\u3002<\/p>\n<p>\u4ed6\u4eec\u9700\u8981\u5f62\u6210\u9632\u5fa1\u578b\u7f16\u7801\u7684\u610f\u8bc6\u2014\u2014\u8003\u8651\u4ed6\u4eec\u81ea\u5df1\u7684\u4ee3\u7801\u53ef\u80fd\u88ab\u653b\u51fb\u7684\u65b9\u5f0f\u3002<\/p>\n<p>\u5b89\u5168\u6700\u597d\u5728\u6574\u4e2a\u8bfe\u7a0b\u4f53\u7cfb\u4e2d\u5206\u5e03\u5f00\u6765\u8fdb\u884c\u8bad\u7ec3\uff1a\u6bcf\u4e2a\u5b66\u79d1\u90fd\u5e94\u8be5\u63d0\u9192\u5b66\u751f\u5173\u4e8e\u8fd9\u4e2a\u5b66\u79d1\u7684\u539f\u751f\u6f0f\u6d1e\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u6bcf\u4e2a\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u81f3\u5c11\u5e94\u8be5\u4e86\u89e3\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>\u793e\u4f1a\u5de5\u7a0b\uff1b<\/li>\n<li>\u7f13\u51b2\u533a\u6ea2\u51fa\uff1b<\/li>\n<li>\u6574\u6570\u6ea2\u51fa\uff1b<\/li>\n<li>\u4ee3\u7801\u6ce8\u5165\u6f0f\u6d1e\uff1b<\/li>\n<li>\u7ade\u6001\u6761\u4ef6\uff1b<\/li>\n<li>\u6743\u9650\u6df7\u6dc6 \u4e00\u4e9b\u8bfb\u8005\u6307\u51fa\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u4e5f\u5e94\u77e5\u9053\u57fa\u672c\u7684 IT \u5b89\u5168\u63aa\u65bd\uff0c\u6bd4\u5982\u9009\u62e9\u5408\u7406\u7684\u597d\u5bc6\u7801\u548c\u4f7f\u7528 iptables \u914d\u7f6e\u9632\u706b\u5899\u3002<\/li>\n<\/ul>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Metasploit: The Penetration Tester\u2019s Guide by Kennedy, O\u2019Gorman, Kearns and Aharoni.<\/li>\n<li>Security Engineering by Anderson.<\/li>\n<\/ul>\n<p>\u5bc6\u7801\u5b66<\/p>\n<p>\u5bc6\u7801\u5b66\u4f7f\u5f97\u6211\u4eec\u7684\u5927\u90e8\u5206\u6570\u5b57\u751f\u6d3b\u6210\u4e3a\u73b0\u5b9e\uff0c \u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u7406\u89e3\u5e76\u80fd\u591f\u5b9e\u73b0\u4e0b\u9762\u7684\u6982\u5ff5\uff0c\u5e76\u4e14\u77e5\u9053\u5b9e\u73b0\u8fd9\u4e9b\u7684\u5e38\u89c1\u9677\u9631\uff1a<\/p>\n<ul class=\"list-paddingleft-2\">\n<li>\u5bf9\u79f0\u5bc6\u7801\u7cfb\u7edf\uff1b<\/li>\n<li>\u516c\u94a5\u5bc6\u7801\u7cfb\u7edf\uff1b<\/li>\n<li>\u5b89\u5168\u54c8\u5e0c\u51fd\u6570\uff1b<\/li>\n<li>\u8be2\u95ee-\u54cd\u5e94\u8ba4\u8bc1\uff1b<\/li>\n<li>\u6570\u5b57\u7b7e\u540d\u7b97\u6cd5\uff1b<\/li>\n<li>\u95e8\u9650\u5bc6\u7801\u7cfb\u7edf \u5728\u5b9e\u73b0\u8fd9\u4e9b\u5bc6\u7801\u7cfb\u7edf\u65f6\u6709\u4e2a\u5e38\u89c1\u7684\u9519\u8bef\u2014\u2014\u4e3a\u624b\u5934\u5de5\u4f5c\u83b7\u5f97 \u8db3\u591f \u968f\u673a\u7684\u6570\uff0c\u800c\u8fd9\u662f\u6bcf\u4e2a\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u77e5\u9053\u7684\u3002<\/li>\n<li>\u6700\u540e\uff0c\u5982\u6b64\u591a\u7684\u6570\u636e\u6cc4\u9732\u8868\u660e\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u77e5\u9053\u5982\u4f55\u5728\u5b58\u50a8\u5bc6\u7801\u65f6\u8fdb\u884c\u52a0\u76d0\u548c\u54c8\u5e0c\u5904\u7406\u3002<\/li>\n<\/ul>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u6bcf\u4e2a\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u6709\u4f7f\u7528\u624b\u5de5\u7edf\u8ba1\u5de5\u5177\u6765\u7834\u89e3\u4f7f\u7528\u524d\u73b0\u4ee3\u52a0\u5bc6\u7cfb\u7edf\u7684\u5bc6\u6587\u7684\u4e50\u8da3\u3002<\/p>\n<p>RSA \u662f\u5bb9\u6613\u5b9e\u73b0\u7684 \uff0c\u6bcf\u4e2a\u4eba\u90fd\u5e94\u8bd5\u8bd5\u3002<\/p>\n<p>\u6bcf\u4e2a\u5b66\u751f\u90fd\u5e94\u521b\u5efa\u4ed6\u4eec\u81ea\u5df1\u7684\u6570\u5b57\u7b7e\u540d\u5e76\u5728 apache \u4e0a\u5efa\u7acb https \u8fde\u63a5\uff08\u505a\u8fd9\u4e2a\u662f\u51fa\u4e4e\u610f\u6599\u7684\u8d39\u52b2\uff09\u3002<\/p>\n<p>\u5b66\u751f\u8fd8\u5e94\u8be5\u5199\u4e00\u4e2a\u4f7f\u7528 SSL \u8fdb\u884c\u8fde\u63a5\u7684 web \u5ba2\u6237\u7aef\u3002<\/p>\n<p>\u4f5c\u4e3a\u5b9e\u8df5\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u8be5\u77e5\u9053\u5982\u4f55\u4f7f\u7528 GPG\u3001ssh \u7684\u516c\u94a5\u8ba4\u8bc1\u3001\u52a0\u5bc6\u4e00\u4e2a\u6587\u4ef6\u5939\u6216\u8005\u786c\u76d8\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Cryptography Engineering by Ferguson, Schneier and Kohno.<\/li>\n<\/ul>\n<p>\u8f6f\u4ef6\u6d4b\u8bd5<\/p>\n<p>\u8f6f\u4ef6\u6d4b\u8bd5\u5fc5\u987b\u8d2f\u7a7f\u6574\u4e2a\u8bfe\u7a0b\u4f53\u7cfb\u3002\u4e00\u4e2a\u8f6f\u4ef6\u5de5\u7a0b\u7684\u8bfe\u7a0b\u53ef\u4ee5\u6db5\u76d6\u57fa\u672c\u7684\u6d4b\u8bd5\u98ce\u683c\uff0c\u4f46\u662f\u53ea\u6709\u7ec3\u4e60\u624d\u80fd\u638c\u63e1\u8fd9\u9879\u827a\u672f\u3002<\/p>\n<p>\u5e94\u8be5\u6839\u636e\u5b66\u751f\u4e0a\u4ea4\u7684\u6d4b\u8bd5\u7528\u4f8b\u6765\u7ed9\u4ed6\u4eec\u6253\u5206\u3002<\/p>\n<p>\u6211\u4f7f\u7528\u5b66\u751f\u4e0a\u4ea4\u6765\u7684\u6d4b\u8bd5\u7528\u4f8b\u6765\u5bf9\u5176\u4ed6\u5b66\u751f\u8fdb\u884c\u6d4b\u8bd5\u3002<\/p>\n<p>\u5b66\u751f\u770b\u8d77\u6765\u5e76\u4e0d\u5f88\u5728\u610f\u9632\u5fa1\u6027\u7684\u6d4b\u8bd5\u7528\u4f8b\uff0c\u4f46\u662f\u5f53\u5411\u540c\u5b66\u4e0b\u624b\u65f6\u5374\u5f88\u662f\u4e0d\u5ba2\u6c14\u3002<\/p>\n<p>\u7528\u6237\u4f53\u9a8c\u8bbe\u8ba1<\/p>\n<p>\u7a0b\u5e8f\u5458\u5927\u591a\u662f\u7ed9\u5176\u4ed6\u7a0b\u5e8f\u5458\u5199\u7a0b\u5e8f\uff0c\u6216\u8005\u66f4\u7cdf\u7cd5\uff0c\u7ed9\u4ed6\u4eec\u81ea\u5df1\u5199\u3002<\/p>\n<p>\u7528\u6237\u63a5\u53e3\u8bbe\u8ba1\uff08\u66f4\u5bbd\u6cdb\u7684\u8bb2\uff0c\u7528\u6237\u4f53\u9a8c\u8bbe\u8ba1\uff09\u53ef\u80fd\u662f\u8ba1\u7b97\u673a\u79d1\u5b66\u6700\u4e0d\u53d7\u91cd\u89c6\u7684\u65b9\u9762\u3002<\/p>\n<p>\u5373\u4f7f\u662f\u5728\u4e13\u5bb6\u4e4b\u95f4\u4e5f\u6709\u8fd9\u79cd\u8bef\u89e3\uff0c\u5373\u7528\u6237\u4f53\u9a8c\u662f\u4e00\u79cd\u65e0\u6cd5\u88ab\u6559\u6388\u7684\u201c\u8f6f\u201d\u6280\u80fd\u3002<\/p>\n<p>\u5728\u73b0\u5b9e\u4e2d\uff0c\u73b0\u4ee3\u7528\u6237\u4f53\u9a8c\u8bbe\u8ba1\u6839\u690d\u4e8e\u4eba\u56e0\u5de5\u7a0b\u5b66\u548c\u5de5\u4e1a\u8bbe\u8ba1\u4e2d\u7684\u4eba\u5de5\u7ecf\u9a8c\u3002<\/p>\n<p>\u5982\u679c\u6ca1\u6709\u522b\u7684\u529e\u6cd5\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u81f3\u5c11\u5e94\u77e5\u9053\u63a5\u53e3\u6267\u884c\u4efb\u4f55\u4efb\u52a1\u7684\u96be\u6613\u7a0b\u5ea6\u5e94\u8be5\u4e0e\u4efb\u52a1\u7684\u9891\u7387\u4e0e\u91cd\u8981\u6027\u7684\u4e58\u79ef\u6210\u6bd4\u4f8b\u3002<\/p>\n<p>\u4e3a\u5b9e\u7528\u6027\u8003\u8651\uff0c\u6bcf\u4e2a\u7a0b\u5e8f\u5458\u5e94\u8be5\u4e60\u60ef\u4e8e\u4f7f\u7528 HTML\u3001CSS \u548c Javascript \u7b49\u8bbe\u8ba1\u53ef\u7528\u7684 web \u63a5\u53e3\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Paul Graham\u2019s essay on Web 2.0.<\/li>\n<li>\u201cThe Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Unicode and Character Sets\u201d by Spolsky.<\/li>\n<li>HTML and CSS: Design and Build Websites by Duckett.<\/li>\n<li>JavaScript: The Definitive Guide by Flanagan.<\/li>\n<\/ul>\n<p>\u53ef\u89c6\u5316<\/p>\n<p>\u597d\u7684\u53ef\u89c6\u5316\u662f\u53ef\u4ee5\u5c06\u6570\u636e\u8868\u73b0\u4e3a\u4eba\u7c7b\u53ef\u4ee5\u611f\u77e5\u7684\u4fe1\u606f\uff0c\u800c\u505a\u5230\u8fd9\u70b9\u5e76\u4e0d\u5bb9\u6613\u3002<\/p>\n<p>\u73b0\u4ee3\u4e16\u754c\u662f\u6570\u636e\u7684\u6d77\u6d0b\uff0c\u800c\u5f00\u53d1\u4eba\u773c\u611f\u77e5\u7684\u5c40\u90e8\u6700\u5927\u503c\u662f\u7406\u89e3\u8fd9\u4e9b\u4fe1\u606f\u7684\u5173\u952e\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>The Visual Display of Quantitative Information by Tufte.<\/li>\n<\/ul>\n<p>\u5e76\u884c\u5316<\/p>\n<p>\u5982\u4eca\u5e76\u884c\u5316\u6bd4\u4ee5\u5f80\u66f4\u843d\u540e\u3001\u66f4\u4e11\u964b\u3002<\/p>\n<p>\u4e0d\u5e78\u7684\u662f\u8981\u638c\u63e1\u5e76\u884c\u5316\u9700\u8981\u5bf9\u67b6\u6784\uff1a\u591a\u6838\u3001\u7f13\u5b58\u3001\u603b\u7ebf\u3001GPU \u7b49\u7b49\u6709\u5f88\u6df1\u7684\u7406\u89e3\u3002<\/p>\n<p>\u5e76\u4e14\u9700\u8981\u7ec3\u4e60\uff0c\u5927\u91cf\u7ec3\u4e60\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u5e76\u884c\u5316\u7684\u201c\u7ec8\u6781\u201d\u7b54\u6848\u8fd8\u4e0d\u5f97\u800c\u77e5\uff0c\u4f46\u662f\u4e00\u4e9b\u9886\u57df\u7279\u5b9a\u7684\u89e3\u51b3\u65b9\u6848\u5df2\u7ecf\u7ed9\u51fa\u3002<\/p>\n<p>\u5f53\u4e0b\u5b66\u751f\u5e94\u8be5\u5b66\u4e60 CUDA \u548c OpenCL\u3002<\/p>\n<p>\u7ebf\u7a0b\u662f\u8106\u5f31\u7684\u5e76\u884c\u5316\u62bd\u8c61\uff0c\u7279\u522b\u662f\u5f15\u5165\u7f13\u5b58\u548c\u7f13\u5b58\u4e00\u81f4\u6027\u4e4b\u540e\u3002\u4f46\u662f\uff0c\u7ebf\u7a0b\u5f88\u6d41\u884c\u4e14\u5fae\u5999\uff0c\u6240\u4ee5\u503c\u5f97\u5b66\u4e60\uff0cPthread \u662f\u4e00\u4e2a\u5408\u7406\u7684\u8f7b\u91cf\u5e93\u3002<\/p>\n<p>\u5bf9\u4e8e\u5bf9\u5927\u89c4\u6a21\u5e76\u884c\u5316\u611f\u5174\u8da3\u7684\u4eba\u6765\u8bf4\uff0cMPI\u662f\u9996\u8981\u6761\u4ef6\u3002<\/p>\n<p>\u5728\u7406\u8bba\u4e0a\uff0cmap-reduce \u662f\u7ecf\u4e45\u4e0d\u8870\u7684\u3002<\/p>\n<p>\u8f6f\u4ef6\u5de5\u7a0b<\/p>\n<p>\u8f6f\u4ef6\u5de5\u7a0b\u7684\u539f\u7406\u6539\u53d8\u5730\u548c\u7f16\u7a0b\u8bed\u8a00\u4e00\u6837\u5feb\u3002<\/p>\n<p>\u4e00\u4e2a\u597d\u7684\u52a8\u624b\u5b9e\u8df5\u7684\u56e2\u961f\u8f6f\u4ef6\u5f00\u53d1\u7ec3\u4e60\u80fd\u591f\u5c55\u73b0\u51fa\u8f6f\u4ef6\u5de5\u7a0b\u56fa\u6709\u8bef\u533a\u5e76\u63d0\u4f9b\u5173\u4e8e\u8fd9\u4e9b\u8bef\u533a\u7684\u5de5\u4f5c\u77e5\u8bc6\u3002 \u4e00\u4e9b\u8bfb\u8005\u5efa\u8bae\u8bf4\u5b66\u751f\u5e94\u8be5\u5206\u4e3a\u4e09\u4eba\u4e00\u7ec4\u5e76\u4e14\u5728\u4e0d\u540c\u7684\u9879\u76ee\u4e2d\u8f6e\u6d41\u5f53\u4f5c\u7ec4\u957f\u3002<\/p>\n<p>\u5b66\u4e60\u5982\u4f55\u4e0e\u73b0\u5b58\u5927\u4ee3\u7801\u5e93\u6253\u4ea4\u9053\u662f\u6bcf\u4e2a\u7a0b\u5e8f\u5458\u7684\u5fc5\u5907\u6280\u80fd\uff0c\u5e76\u4e14\u6700\u597d\u662f\u5728\u5b66\u6821\u800c\u4e0d\u662f\u5728\u5de5\u4f5c\u4e2d\u638c\u63e1\u6b64\u9879\u6280\u80fd\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u6240\u6709\u7684\u5b66\u751f\u90fd\u5e94\u77e5\u9053\u96c6\u4e2d\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u5982 svn \u548c\u5206\u5e03\u5f0f\u7248\u672c\u63a7\u5236\u7cfb\u7edf\u5982 git\u3002<\/p>\n<p>\u5bf9\u4e8e\u8c03\u8bd5\u5de5\u5177\u5982 gdb \u548c valgrind \u7684\u4f7f\u7528\u5f88\u957f\u65f6\u95f4\u540e\u4f1a\u6709\u88e8\u76ca\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Version Control by Example by Sink.<\/li>\n<\/ul>\n<p>\u5f62\u5f0f\u5316\u65b9\u6cd5<\/p>\n<p>\u968f\u7740\u5bf9\u5b89\u5168\u53ef\u9760\u8f6f\u4ef6\u7684\u9700\u6c42\u63d0\u9ad8\uff0c\u5f62\u5f0f\u5316\u65b9\u6cd5\u4e5f\u8bb8\u5c06\u662f\u5f00\u53d1\u8fd9\u79cd\u8f6f\u4ef6\u7684\u552f\u4e00\u65b9\u6cd5\u3002<\/p>\n<p>\u5f53\u524d\u8f6f\u4ef6\u7684\u5f62\u5f0f\u5316\u6a21\u578b\u548c\u8bc1\u660e\u8fd8\u5f88\u6709\u6311\u6218\u6027\uff0c\u4f46\u662f\u8fd9\u9879\u9886\u57df\u7684\u8fdb\u7a0b\u662f\u7a33\u5065\u7684\uff1a\u4e00\u5e74\u6bd4\u4e00\u5e74\u5bb9\u6613\u3002<\/p>\n<p>\u4e5f\u8bb8\u5728\u5f53\u524d\u7684\u8ba1\u7b97\u673a\u7cfb\u5b66\u751f\u7684\u6709\u751f\u4e4b\u5e74\uff0c\u5f62\u5f0f\u5316\u8f6f\u4ef6\u5f00\u53d1\u80fd\u6210\u4e3a\u4e00\u79cd\u9884\u671f\u6280\u80fd\u3002<\/p>\n<p>\u6bcf\u4e2a\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u5e94\u81f3\u5c11\u719f\u7ec3\u4f7f\u7528\u4e00\u79cd\u5b9a\u7406\u8bc1\u660e\u5668\uff08\u6211\u8ba4\u4e3a\u5177\u4f53\u662f\u54ea\u4e00\u79cd\u5e76\u4e0d\u91cd\u8981\uff09\u3002<\/p>\n<p>\u5b66\u4e60\u4f7f\u7528\u5b9a\u7406\u8bc1\u660e\u65b9\u6cd5\u80fd\u591f\u7acb\u523b\u5f71\u54cd\u4ee3\u7801\u98ce\u683c\u3002<\/p>\n<p>\u6bd4\u5982\u8bf4\uff0c\u4e00\u4e2a\u4eba\u672c\u80fd\u7684\u4e0d\u613f\u5199\u65e0\u6cd5\u8986\u76d6\u6240\u6709\u53ef\u80fd\u6027\u7684 match \u548c switch \u8bed\u53e5\uff0c\u3002<\/p>\n<p>\u518d\u6bd4\u5982\u5f53\u5199\u9012\u5f52\u51fd\u6570\u65f6\uff0c\u4f7f\u7528\u7406\u8bba\u8bc1\u660e\u65b9\u6cd5\u7684\u4eba\u6709\u5f88\u5f3a\u7684\u6b32\u671b\u53bb\u6d88\u9664 ill-foundedness\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Software Foundations.<\/li>\n<\/ul>\n<p>\u56fe\u5f62\u4eff\u771f<\/p>\n<p>\u6ca1\u6709\u5b66\u79d1\u6bd4\u56fe\u66f4\u80fd\u4f53\u73b0\u201c\u806a\u660e\u201d\u3002<\/p>\n<p>\u8fd9\u4e2a\u9886\u57df\u662f\u7531\u201c\u8db3\u591f\u597d\u201d\u9a71\u52a8\u751a\u81f3\u7531\u4e4b\u5b9a\u4e49\u7684\u3002<\/p>\n<p>\u56e0\u6b64\uff0c\u6ca1\u6709\u6bd4\u56fe\u5f62\u4eff\u771f\u66f4\u597d\u7684\u65b9\u5f0f\u6765\u6559\u6388\u5de7\u5999\u7684\u7f16\u7a0b\u548c\u8fdb\u884c\u6027\u80fd\u4f18\u5316\u3002<\/p>\n<p>\u6211\u6240\u5b66\u5230\u7684\u534a\u6570\u7f16\u7801\u6280\u5de7\u90fd\u6765\u81ea\u4e8e\u5bf9\u56fe\u7684\u5b66\u4e60\u3002<\/p>\n<p><strong>\u7279\u522b\u63a8\u8350<\/strong><\/p>\n<p>\u7b80\u5355\u7684\u5149\u7ebf\u8ffd\u8e2a\u5668\u53ef\u4ee5\u5728\u767e\u884c\u4ee3\u7801\u5185\u5b9e\u73b0\u3002<\/p>\n<p>\u5b9e\u73b0\u4ece 3D wireframe engine \u83b7\u53d6 3D \u6295\u5f71\u662f\u8d39\u4e9b\u8111\u529b\u7684\u3002<\/p>\n<p>\u7c7b\u4f3c\u4e8e BSP \u7684\u6570\u636e\u7ed3\u6784\u4ee5\u53ca\u7c7b\u4f3c\u4e8e z-buffer \u6e32\u67d3\u7684\u7b97\u6cd5\u662f\u5de7\u5999\u7684\u8bbe\u8ba1\u7684\u4f8b\u5b50\u3002<\/p>\n<p>\u5728\u56fe\u5f62\u4eff\u771f\u9886\u57df\uff0c\u8fd8\u6709\u5f88\u591a\u5176\u4ed6\u5b9e\u4f8b\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Mathematics for 3D Game Programming and Computer Graphics by Lengyel.<\/li>\n<\/ul>\n<p>\u673a\u5668\u4eba<\/p>\n<p>\u673a\u5668\u4eba\u662f\u6559\u6388\u7f16\u7a0b\u5165\u95e8\u7684\u6700\u5177\u5438\u5f15\u529b\u7684\u65b9\u5f0f\u4e4b\u4e00\u3002<\/p>\n<p>\u5e76\u4e14\u968f\u7740\u673a\u5668\u4eba\u7684\u4ef7\u683c\u6301\u7eed\u8d70\u4f4e\uff0c\u54ea\u4e00\u6b3e\u5c06\u5f15\u53d1\u4e2a\u4eba\u673a\u5668\u4eba\u6d6a\u6f6e\u6210\u4e3a\u4e86\u95e8\u69db\u3002<\/p>\n<p>\u5bf9\u4e8e\u4f1a\u7f16\u7a0b\u7684\u4eba\u6765\u8bf4\uff0c\u4e2a\u4eba\u673a\u5668\u81ea\u52a8\u5316\u7684\u4f1f\u5927\u65f6\u4ee3\u5373\u5c06\u6765\u4e34\u3002<\/p>\n<p><strong>\u76f8\u5173\u63a8\u8350<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>Multitouch gesture control for a robot.<\/li>\n<\/ul>\n<p>\u4eba\u5de5\u667a\u80fd<\/p>\n<p>\u4ec5\u662f\u8003\u8651\u5230\u5bf9\u65e9\u671f\u8ba1\u7b97\u5386\u53f2\u7684\u7279\u5927\u5f71\u54cd\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u4e5f\u5e94\u5b66\u4e60\u4eba\u5de5\u667a\u80fd\u3002<\/p>\n<p>\u5373\u4f7f\u4eba\u5de5\u667a\u80fd\u7684\u6700\u521d\u68a6\u60f3\u8fd8\u8fdc\u672a\u5b9e\u73b0\uff0c\u4eba\u5de5\u667a\u80fd\u5728\u4e00\u4e9b\u9886\u57df\u5df2\u6709\u6210\u6548\uff0c\u6bd4\u5982\u673a\u5668\u5b66\u4e60\u3001\u6570\u636e\u6316\u6398\u548c\u81ea\u7136\u8bed\u8a00\u5904\u7406\u7b49\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<p>Artificial Intelligence by Russell and Norvig.<\/p>\n<p>\u673a\u5668\u5b66\u4e60<\/p>\n<p>\u9664\u53bb\u51fa\u8272\u7684\u6280\u672f\u6280\u672f\u4f18\u70b9\uff0c\u5bf9\u201crelevance engineer\u201d\u5de5\u4f5c\u5c97\u4f4d\u7684\u9700\u6c42\u589e\u5927\u8868\u793a\u51fa\u6bcf\u4e2a\u8ba1\u7b97\u673a\u79d1\u5b66\u5bb6\u90fd\u5e94\u8be5\u4e86\u89e3\u4e00\u4e0b\u57fa\u672c\u7684\u673a\u5668\u5b66\u4e60\u3002<\/p>\n<p>\u673a\u5668\u5b66\u4e60\u4e5f\u66f4\u52a0\u5f3a\u8c03\u4e86\u7406\u89e3\u6982\u7387\u8bba\u548c\u7edf\u8ba1\u7684\u91cd\u8981\u6027\u3002<\/p>\n<p><strong>\u63a8\u8350\u9605\u8bfb<\/strong><\/p>\n<p>Machine Learning by Mitchell.<\/p>\n<p>\u6570\u636e\u5e93<\/p>\n<p>\u6570\u636e\u5e93\u5341\u5206\u5e38\u89c1\u548c\u6709\u7528\u4ee5\u81f3\u4e8e\u4eba\u4eec\u5e38\u5e38\u5ffd\u7565\u5b83\u3002<\/p>\n<p>\u7406\u89e3\u652f\u6491\u6570\u636e\u5e93\u5f15\u64ce\u7684\u6570\u636e\u7ed3\u6784\u4e0e\u7b97\u6cd5\u662f\u6709\u7528\u7684\uff0c\u56e0\u4e3a\u7a0b\u5e8f\u5458\u7ecf\u5e38\u9700\u8981\u5728\u4e00\u4e2a\u5927\u7684\u8f6f\u4ef6\u7cfb\u7edf\u4e2d\u5b9e\u73b0\u4e00\u4e2a\u6570\u636e\u5e93\u7cfb\u7edf\u3002<\/p>\n<p>\u5728sub-Turing \u7684\u8ba1\u7b97\u6a21\u578b\u7684\u6781\u5927\u6210\u529f\u80cc\u540e\u5173\u7cfb\u4ee3\u6570\u548c\u5173\u7cfb\u8ba1\u7b97\u8d77\u4e86\u6781\u5927\u7684\u4f5c\u7528\u3002<\/p>\n<p>\u6bd4\u8d77 UML \u6a21\u578b\uff0cER \u6a21\u578b\u66f4\u9002\u4e8e\u53ef\u89c6\u5316\u7f16\u7801\u8bbe\u8ba1\u548c\u7ea6\u675f\u7684\u8f6f\u4ef6\u8bbe\u8ba1\u3002<\/p>\n<p><strong>\u5efa\u8bae\u9605\u8bfb<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>SQL and Relational Theory by Date.<\/li>\n<\/ul>\n<p><strong>\u975e\u7279\u5b9a\u7684\u9605\u8bfb\u63a8\u8350<\/strong><\/p>\n<ul class=\"list-paddingleft-2\">\n<li>G\u00f6del, Escher, Bach by Hofstadter.<\/li>\n<li>Nick Black\u2019s advice for MS students.<\/li>\n<\/ul>\n<p>\u8fd8\u6709\u4ec0\u4e48\uff1f<\/p>\n<p>\u7531\u4e8e\u6211\u81ea\u5df1\u4e5f\u662f\u77e5\u8bc6\u76f2\u70b9\u7684\uff0c\u6240\u4ee5\u4e0a\u9762\u8fd9\u4e9b\u5efa\u8bae\u4e5f\u662f\u6709\u5c40\u9650\u7684\u3002<\/p>\n<p>\u5982\u679c\u8fd8\u6709\u54ea\u4e9b\u5e94\u5f53\u5305\u542b\u4f46\u6ca1\u6709\u5217\u51fa\u7684\u4e1c\u897f\uff0c\u8bf7\u5927\u5bb6\u5728\u8bc4\u8bba\u4e2d\u8865\u5145\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u82f1\u6587\uff1aMatt \u8bd1\u6587\uff1a\u4f2f\u4e50\u5728\u7ebf &#8211; \u963f\u55b5 \u94fe\u63a5\uff1ahttp:\/\/blog.jobbole.com\/1 &hellip; <a href=\"http:\/\/blog.softwareclues.com\/zh\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b\" class=\"more-link\">\u7ee7\u7eed\u9605\u8bfb<span class=\"screen-reader-text\">\u201c\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b\u201d<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[3,49],"tags":[55,77],"translation":{"provider":"WPGlobus","version":"2.12.2","language":"zh","enabled_languages":["en","zh"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"zh":{"title":false,"content":false,"excerpt":false}}},"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b - \u8f6f\u4ef6\u542f\u793a\u5f55<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/blog.softwareclues.com\/\u6bcf\u4e2a-cs-\u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b - \u8f6f\u4ef6\u542f\u793a\u5f55\" \/>\n<meta property=\"og:url\" content=\"http:\/\/blog.softwareclues.com\/\u6bcf\u4e2a-cs-\u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b\" \/>\n<meta property=\"og:site_name\" content=\"\u8f6f\u4ef6\u542f\u793a\u5f55\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-21T19:40:38+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b\",\"url\":\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b\",\"name\":\"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b - \u8f6f\u4ef6\u542f\u793a\u5f55\",\"isPartOf\":{\"@id\":\"http:\/\/blog.softwareclues.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#primaryimage\"},\"image\":{\"@id\":\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#primaryimage\"},\"thumbnailUrl\":\"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1\",\"datePublished\":\"2016-05-21T19:40:38+00:00\",\"dateModified\":\"2016-05-21T19:40:38+00:00\",\"author\":{\"@id\":\"http:\/\/blog.softwareclues.com\/#\/schema\/person\/4c47e4e97a658930b6c0e90f4a4eda82\"},\"breadcrumb\":{\"@id\":\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#primaryimage\",\"url\":\"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1\",\"contentUrl\":\"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/blog.softwareclues.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/blog.softwareclues.com\/#website\",\"url\":\"http:\/\/blog.softwareclues.com\/\",\"name\":\"\u8f6f\u4ef6\u542f\u793a\u5f55\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/blog.softwareclues.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/blog.softwareclues.com\/#\/schema\/person\/4c47e4e97a658930b6c0e90f4a4eda82\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"http:\/\/blog.softwareclues.com\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/2.gravatar.com\/avatar\/e4fb391d9f5bb29583ed9579324a5e17?s=96&d=mystery&r=g\",\"contentUrl\":\"http:\/\/2.gravatar.com\/avatar\/e4fb391d9f5bb29583ed9579324a5e17?s=96&d=mystery&r=g\",\"caption\":\"Editorial Team\"},\"url\":\"http:\/\/blog.softwareclues.com\/zh\/author\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b - \u8f6f\u4ef6\u542f\u793a\u5f55","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/blog.softwareclues.com\/\u6bcf\u4e2a-cs-\u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b","og_locale":"zh_CN","og_type":"article","og_title":"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b - \u8f6f\u4ef6\u542f\u793a\u5f55","og_url":"http:\/\/blog.softwareclues.com\/\u6bcf\u4e2a-cs-\u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b","og_site_name":"\u8f6f\u4ef6\u542f\u793a\u5f55","article_published_time":"2016-05-21T19:40:38+00:00","og_image":[{"url":"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"Editorial Team","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"3 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b","url":"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b","name":"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b - \u8f6f\u4ef6\u542f\u793a\u5f55","isPartOf":{"@id":"http:\/\/blog.softwareclues.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#primaryimage"},"image":{"@id":"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#primaryimage"},"thumbnailUrl":"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1","datePublished":"2016-05-21T19:40:38+00:00","dateModified":"2016-05-21T19:40:38+00:00","author":{"@id":"http:\/\/blog.softwareclues.com\/#\/schema\/person\/4c47e4e97a658930b6c0e90f4a4eda82"},"breadcrumb":{"@id":"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b"]}]},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#primaryimage","url":"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1","contentUrl":"http:\/\/mmbiz.qpic.cn\/mmbiz\/fhujzoQe7TrOquNA9iah7CsEyjRABEFgwRvEloNt1SfJFBqDDvLaqaH12INw46A8PySdSHNHuTTIKkfib3l7LpAA\/640?wx_fmt=jpeg&amp;wxfrom=5&amp;wx_lazy=1"},{"@type":"BreadcrumbList","@id":"http:\/\/blog.softwareclues.com\/%e6%af%8f%e4%b8%aa-cs-%e7%b3%bb%e5%ad%a6%e7%94%9f%e9%83%bd%e5%ba%94%e8%af%a5%e7%9f%a5%e9%81%93%e7%9a%84%e4%ba%8b#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/blog.softwareclues.com\/"},{"@type":"ListItem","position":2,"name":"\u6bcf\u4e2a CS \u7cfb\u5b66\u751f\u90fd\u5e94\u8be5\u77e5\u9053\u7684\u4e8b"}]},{"@type":"WebSite","@id":"http:\/\/blog.softwareclues.com\/#website","url":"http:\/\/blog.softwareclues.com\/","name":"\u8f6f\u4ef6\u542f\u793a\u5f55","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/blog.softwareclues.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"zh-Hans"},{"@type":"Person","@id":"http:\/\/blog.softwareclues.com\/#\/schema\/person\/4c47e4e97a658930b6c0e90f4a4eda82","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"http:\/\/blog.softwareclues.com\/#\/schema\/person\/image\/","url":"http:\/\/2.gravatar.com\/avatar\/e4fb391d9f5bb29583ed9579324a5e17?s=96&d=mystery&r=g","contentUrl":"http:\/\/2.gravatar.com\/avatar\/e4fb391d9f5bb29583ed9579324a5e17?s=96&d=mystery&r=g","caption":"Editorial Team"},"url":"http:\/\/blog.softwareclues.com\/zh\/author\/admin"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paLJfj-bg","jetpack-related-posts":[],"_links":{"self":[{"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/posts\/698"}],"collection":[{"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/comments?post=698"}],"version-history":[{"count":2,"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/posts\/698\/revisions"}],"predecessor-version":[{"id":700,"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/posts\/698\/revisions\/700"}],"wp:attachment":[{"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/media?parent=698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/categories?post=698"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.softwareclues.com\/zh\/wp-json\/wp\/v2\/tags?post=698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}