搜索结果
找到约 657 项符合
depth-first 的查询结果
其他书籍 The initial planning and thinking about this book began during a discussion of SQL Server futures in
The initial planning and thinking about this book began during a discussion of SQL Server futures in
July 2001. The discussion was with Rob Howard during a trip to Microsoft to discuss the first book I was
working on at that time. After that, I stayed involved in what was happening in ADO.NET by goi ...
其他书籍 This book is a hands-on introduction to the principles and practice of embedded system design usin
This book is a hands-on introduction to the principles and
practice of embedded system design using the PIC microcontroller. Packed
with helpful examples and illustrations, it gives an in-depth treatment of
microcontroller design, programming in both assembly language and C, and
features advance ...
Java编程 印度高手Struts and Hibernate教程,用MyEclipse开发.书和源码In this tutorial we will show how the Web Framework Stru
印度高手Struts and Hibernate教程,用MyEclipse开发.书和源码In this tutorial we will show how the Web Framework Struts and the Database Persistence Solution
Hibernate can be used together. Though we explain some basic, you should try the basic tutorials
for each technology first when you are a beginner ...
微处理器开发 This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new c
This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It
permits you to download new code to the device over USB. This bootrom is
installed at address 0x00000000 in the ARM, which means that it is the
first piece of code to execute after reset. At startup, it waits for
a few seconds to ...
单片机开发 There are many different (and often confusing) terms associated with clock-based devices. This appl
There are many different (and often confusing) terms associated
with clock-based devices. This application note attempts
to clarify these terms, and hence serves as a comprehensive
reference on clock terminology. This application note can be
divided into two sections. The first section describes and ...
其他 In this talk we will consider two approaches in dealing with the risk of supplier bankruptcy. In the
In this talk we will consider two approaches in dealing with the risk of supplier bankruptcy. In the first model, we study the effects of supply disruption risk in a supply chain where one buyer deals with competing risky suppliers who may default during their production lead-times.
邮电通讯系统 Using spectra to calculate strength of reflections and losses in passive cavities.The wavelength, re
Using spectra to calculate strength of reflections and losses in passive cavities.The wavelength, reflection spectrum and transmission spectrum should be in the first 3 columns of an Excel file, which is selected when the cavity.m Matlab file is run.
Java书籍 SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004
SQL Server Security Distilled, Second Edition
by Morris Lewis ISBN:1590592190
Apress &copy 2004 (352 pages)
This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with tha ...
VC书籍 Book: Windows Graphics Programming Win32 GDI and DirectDraw Author: Feng Yuan Publisher: Prentice
Book: Windows Graphics Programming Win32 GDI and DirectDraw
Author: Feng Yuan
Publisher: Prentice Hall PTR
First Edition December 01, 2000
ISBN: 0-13-086985-6, 1234 pages
从Chinaitlab上下载后不能阅读,这是重新Compile、整理后的版本
其他书籍 With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator a ...