this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programmi...
In-Memory+Database技术资料下载专区,收录4,539份相关技术文档、开发源码、电路图纸等优质工程师资源,全部免费下载。
this is the document for the secure development in java. It covers in very good details the aspect of security programmi...
this is the document for the secure development in java. It covers in very good details the aspect of security programmi...
A generic widestring list for use in all versions of Delphi. It has all the capabilities you find in the TStrings class,...
A byte comunication system made in java that can be used to send messages in betweeen computers on the same network.
some dummy reverse of colors and forms in a live video capture made in processing (based on java) from processing.org (f...
Database Hackers Handbook (Chapter 10, 11, 12): Hacking Informix 欲了解Informix安全结构的必要参考。
微软官方 MSDN98 Visual Database Tools 参考手册 有关对于 SQL Oracle 等的支持
用P/Invoke显示设备内存信息 P/Invoke with compact framework get the Memory Status and Storage Cards
ICP fit points in data to the points in model. Fit with respect to minimize the sum of square errors with the closest mo...
Thinking in C++ 2nd edition source code which are all the cores of the book Thinking in C++ second edition.that s the be...