搜索结果

找到约 200 项符合 Configuration 的查询结果

Linux/Unix编程 This book was written to provide a single reference for network administration in a Linux environmen

This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration.
https://www.eeworm.com/dl/619/228324.html
下载: 196
查看: 1074

其他 BlueCore supports a mechanism called Device Firmware Upgrade (DFU) to enable its software and config

BlueCore supports a mechanism called Device Firmware Upgrade (DFU) to enable its software and configuration data to be replaced. To guard against unauthorised changes, downloaded files can be verified by means of signatures. The DFU Tools are a suite of programs that enable firmware and persistent ...
https://www.eeworm.com/dl/534/229819.html
下载: 51
查看: 1064

系统设计方案 The development of a data acquisition card based on USB bus is introduced in this article.It first d

The development of a data acquisition card based on USB bus is introduced in this article.It first describes the configuration and principle of this card in the part of hardware design,and then the application program and device driver in the part of software design.Data acquisition program in firmw ...
https://www.eeworm.com/dl/678/230969.html
下载: 136
查看: 1078

通讯编程文档 Abstract: By using gateway systems on large 32-bit platforms, networks of small, 8- and 16-bit mic

Abstract: By using gateway systems on large 32-bit platforms, networks of small, 8- and 16-bit microcontrollers can be monitored and controlled over the Internet. With embedded Linux, these gateways are easily moved from full-blown host PCs to embedded platforms like the PC104. In this class you wil ...
https://www.eeworm.com/dl/646/231897.html
下载: 120
查看: 1107

其他 The Microsoft&reg Cryptographic Application Programming Interface (CryptoAPI) provides services that

The Microsoft&reg Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32&reg -based applications. Application developers can use the functions in the CryptoAPI without k ...
https://www.eeworm.com/dl/534/232527.html
下载: 60
查看: 1070

其他数据库 员工培训系统 首先确认您的机器上已经安装了VC6.0以上版本

员工培训系统 首先确认您的机器上已经安装了VC6.0以上版本,要编译生成可执行文件,需打开后缀名为dsw的文件,系统会默认用VC打开,然后选择Build菜单下的Set Active Configuration选项,选择Project Configuration为Win32 Release,然后编译项目,得到可执行文件。连接数据库请参照第2章的方法,在ODBC数据源内添加Microso ...
https://www.eeworm.com/dl/645/243680.html
下载: 20
查看: 1051

Java编程 Abstract The Lucene Server project is an attempt to extend the Jakarta Lucene tool with server ca

Abstract The Lucene Server project is an attempt to extend the Jakarta Lucene tool with server capabilities. Lucene is a robust Java API that enables you creating indexes from text sources and perform powerful searches on these indexes. With Lucene, creating an index must be done programmatically ...
https://www.eeworm.com/dl/633/244853.html
下载: 52
查看: 1042

其他 Lua is a powerful, light-weight programming language designed for extending applications. It is also

Lua is a powerful, light-weight programming language designed for extending applications. It is also frequently used as a general-purpose, stand-alone language. It combines simple procedural syntax (similar to Pascal) with powerful data description constructs based on associative arrays and extensib ...
https://www.eeworm.com/dl/534/246090.html
下载: 73
查看: 1038

Java编程 Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write

Hibernate: A Developer s Notebook shows you how to use Hibernate to automate persistence: you write natural Java objects and some simple configuration files, and Hibernate automates all the interaction between your objects and the database. You don t even need to know the database is there, and you ...
https://www.eeworm.com/dl/633/280964.html
下载: 52
查看: 1069

微处理器开发 This code is described in "Computational Geometry in C" (Second Edition), Chapter 8. It is not writ

This code is described in "Computational Geometry in C" (Second Edition), Chapter 8. It is not written to be comprehensible without the explanation in that book. Prints out one arm configuration to reach given target. Assumes number of links >= 3. Input: nlinks Number of links L1 L2 ... Ln Link l ...
https://www.eeworm.com/dl/655/315381.html
下载: 139
查看: 1037