搜索结果
找到约 1,158 项符合
itextsharp-all 的查询结果
其他书籍 This is the demo source code for embedded VxWorks, which include severl functions. The function sour
This is the demo source code for embedded VxWorks, which include severl functions. The function source codes are all written in C language.
其他书籍 It can also accept a number of ftp connection (multithreaded), and with most of the commercial ftp s
It can also accept a number of ftp connection (multithreaded), and with most of the commercial ftp server functions. Server supports all basic ftp orders and to provide a simple user interface management, virtual directory support. This article comes from shrimp o
加密解密 I think this the first time every one can look at a PE crypter source in top level language such VC
I think this the first time every one can look at a PE crypter source
in top level language such VC++.
So as I promised ... if some one sent me one nice compress source I would
publish my source.
I dedicate this source to all people who involve in this field.
I hope it helps someone.
Have good day ...
加密解密 EnumCSP - Enumerates Crypto Service Providers Copyright (c) 2000-2004 G.Chapillon <GChapil
EnumCSP - Enumerates Crypto Service Providers
Copyright (c) 2000-2004 G.Chapillon
<GChapillon@aol.com>
All Rights Reserved.
Contributor:
Jupiter <by.Jupiter@Gmail.com>
其他书籍 This book is a hands-on introduction to the principles and practice of embedded system design usin
This book is a hands-on introduction to the principles and
practice of embedded system design using the PIC microcontroller. Packed
with helpful examples and illustrations, it gives an in-depth treatment of
microcontroller design, programming in both assembly language and C, and
features advance ...
Linux/Unix编程 This book was written to provide a single reference for network administration in a Linux environmen
This book was written to provide a single reference for network administration in a Linux environment.
Beginners and experienced users alike should find the information they need to cover nearly all important
administration activities required to manage a Linux network configuration.
技术管理 This paper addresses a stochastic-#ow network in which each arc or node has several capacities and m
This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may
fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is
not less than d. A simple algorithm is proposed "rstly to generate all lower boundary poin ...
技术管理 This paper addresses a stochastic-#ow network in which each arc or node has several capacities and m
This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may
fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is
not less than d. A simple algorithm is proposed "rstly to generate all lower boundary poin ...
技术管理 This paper addresses a stochastic-#ow network in which each arc or node has several capacities and m
This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may
fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is
not less than d. A simple algorithm is proposed "rstly to generate all lower boundary poin ...
技术管理 This paper addresses a stochastic-#ow network in which each arc or node has several capacities and m
This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may
fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is
not less than d. A simple algorithm is proposed "rstly to generate all lower boundary poin ...