搜索结果
找到约 37 项符合
integrity 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (3)
- 技术资料 (3)
- PCB相关 (2)
- 单片机编程 (2)
- 其他数据库 (2)
- 软件设计/软件工程 (2)
- 多媒体处理 (1)
- 模拟电子 (1)
- 传感与控制 (1)
- 可编程逻辑 (1)
- Delphi控件源码 (1)
- 其他行业 (1)
- Linux/Unix编程 (1)
- 编译器/解释器 (1)
- 压缩解压 (1)
- 网络 (1)
- 嵌入式Linux (1)
- MySQL数据库 (1)
- 技术管理 (1)
- VC书籍 (1)
- 多国语言处理 (1)
- Jsp/Servlet (1)
- 文章/文档 (1)
- Java编程 (1)
- 加密解密 (1)
- 其他 (1)
- 设计相关 (1)
- 开关电源 (1)
- 书籍 (1)
编译器/解释器 C-Talk is interpreted scripting language with C-like syntax and dynamic type checking. Variables in
C-Talk is interpreted scripting language with C-like syntax and dynamic type checking. Variables in C-Talk have no type. So there is no compile time type checking in C-Talk, all checking is performed at runtime. To preserve reference integrity, explicit memory deallocation is prohibited in C-Talk, u ...
压缩解压 Student status management system is development two aspects that typical information management syst
Student status management system is development two aspects that typical information management system, IMS( MIS), its development includes primarily the background database creates with support and the front end applies the procedure.Creates to rise to the former request the consistency of data is ...
其他书籍 《为Windows Vista编写安全的代码》
《为Windows Vista编写安全的代码》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. ...
MySQL数据库 The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log use
The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log uses a basic user authentication system to ensure user accountability and log integrity. It also has a RTF editor integrated into it.
技术管理 The public key infrastructure (PKI) is the foundation and center of network security architecture no
The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
其他数据库 As information technology is more and more in-depth and wide range of applications, management infor
As information technology is more and more in-depth and wide range of applications, management information system has been gradually implemented in the technical maturity. Management Information System is a continuous development of new disciplines. Library Management System is a typical management ...
多国语言处理 材料管理系统
材料管理系统,用VB开发,界面漂亮。-integrity of the internal management system, using VB, beautiful interface.
Jsp/Servlet Use the links below to download a source distribution of Ant from one of our mirrors. It is good pra
Use the links below to download a source distribution of Ant from one of our mirrors. It is good practice to verify the integrity of the distribution files, especially if you are using one of our mirror sites. In order to do this you must use the signatures from our main distribution directory.
Ant ...
软件设计/软件工程 This contains the following topics and more ADA versus C and Cplus plus Ada_training ADA 2005 for
This contains the following topics and more
ADA versus C and Cplus plus
Ada_training
ADA 2005 for High Integrity Systems
ada_language_notes
Sample programs
软件设计/软件工程 This document specifies a subset of the C programming language which is intended to be suitable for
This document specifies a subset of the C programming language which is intended to be suitable
for embedded automotive systems up to and including safety integrity level 3 (as defined in the
MISRA Guidelines). It contains a list of rules concerning the use of the C programming language
together wit ...