搜索结果
找到约 1,105 项符合
end-User 的查询结果
Java书籍 This taglib contains tags used to create struts input forms, as well as other tags generally useful
This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces.
Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combi ...
Linux/Unix编程 Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardw
Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user
嵌入式/单片机编程 Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html
Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔.
http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html
part 2 of 3: user mode LIB
Windows Mobile Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While
Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration.
While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.
医药行业 先运行力控应用程序(如演示工程——反应釜)
先运行力控应用程序(如演示工程——反应釜),实时数据库系统亦随之启动。
然后启动delphi6.0,创建一个新的工程。
在form1窗体中,放置DdeClientConv控件(system标签页),设置ConnectMode属性值为ddeAutomatic、DdeService属性值为db、DdeTopic属性值为db;
接下来放置DdeClientItem控件(s ...
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
SQL Server 合同与报价系统 PB8开发
合同与报价系统
PB8开发,sysbase sql anywhere7
默认密码:user:admin password:admin
ODBC设置为
Database=HxFirm
UserId=tt
ServerName=order
LogId=tt
Java书籍 The purpose of this chapter is to bring relative newcomers up to speed in writing, compiling, and pa
The purpose of this chapter is to bring relative newcomers up to speed in writing, compiling, and packaging servlets and JSPs. If you have never developed a servlet or JSP before, or just need to brush up on the technology to jumpstart your development, then the upcoming recipes provide simple progr ...