搜索:leverage
找到约 8 项符合「leverage」的查询结果
结果 8
https://www.eeworm.com/dl/684/472671.html
软件设计/软件工程
Learn how to leverage a key Java technology used to access relational data from Java programs, in
Learn how to leverage a key Java technology used to access
relational data from Java programs, in an Oracle environment.
Author Donald Bales begins by teaching you the mysteries of
establishing database connections, and how to issue SQL queries
and get results back. You ll mo ...
https://www.eeworm.com/dl/534/494772.html
其他
this file is leverage algorithm written in matlab as m-file and tested in matlab.so anyone can ue th
this file is leverage algorithm written in matlab as m-file and tested in matlab.so anyone can ue this algorithm and any bug can be reported
https://www.eeworm.com/dl/542/439948.html
其他书籍
The world s bestselling computer security book--fully expanded and updated is one of the most succes
The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.
https://www.eeworm.com/dl/542/268877.html
其他书籍
With the successful implementation of XML Schema, developers are learning how to increase productivi
With the successful implementation of XML Schema, developers are learning how to increase productivity, improve software reliability, minimize development time, and decrease time to market. This in-depth reference is an all-in-one resource designed to help developers leverage the ...
https://www.eeworm.com/dl/542/216214.html
其他书籍
This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete s
This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete set of tips, tricks, and tools for web developers, system administrators, and programmers who want to leverage the untapped power of XML. If you want more than the average XML user- ...
https://www.eeworm.com/dl/698/493647.html
认证考试资料
What you always wanted to know about networking but were afraid to ask! * How networks and the In
What you always wanted to know about networking but were afraid to ask!
* How networks and the Internet work
* How to build coherent, cost-effective network infrastructures
* How to design networks for maximum reliability and availability
* What you need to know about data cente ...
https://www.eeworm.com/dl/522275.html
论文
CMOS MEMS_ A KEY TECHNOLOGY
The mature CMOS fabrication processes are available
in many IC foundries. It is cost-effective to leverage the
existing CMOS fabrication technologies to implement
MEMS devices. On the other hand, the MEMS devices
could also add values to the IC industry as the Moore’s law
reachi ...
https://www.eeworm.com/dl/656/454269.html
Java书籍
As I write this foreword, I am collaborating with four leading user interface (UI) component vendo
As I write this foreword, I am collaborating with four leading user interface
(UI) component vendors on a presentation for the 2004 JavaOneSM conference.
In our presentation, the vendors will show how they leverage JavaServerTM
Faces technology in their products. While developi ...