This section describes the general options in the IAR Embedded Workbench® IDE. For information about how options can be set, the ARM® IAR Embedded Workbench® IDE User Guide.
标签: information describes Workbench the
上传时间: 2013-12-11
上传用户:hustfanenze
(1 . Higher Educati on Admissi on Committee Office of L ianyungang,L ianyungang 222006, China 2 . Modern Educati on Technique Center, Huaihai I nstitute of Technol ogy, L ianyungang 222005, China) Abstract: The outbreak ofARP cheating virus interferes with the nor mal functi oning of LAN. On the basis of thoroughly und standing of the p rinci p les, this paper analyzes the p rinci p les, pattern and classificati ons ofARP in details . And it also discu the tactics t o take strict p recauti ons ofARP fr om t wo sides— — —the administrati on ofLAN and Client Host . The pur pose of the cussi on is t o guarantee the normal running of LAN users . Key words: virus p rinci p les LAN client host
标签: ianyungang Committee Educati Admissi
上传时间: 2013-12-23
上传用户:zhangyigenius
The purpose of this document is to define the format of the messages and data being communicated between microprocessors used in heavy-duty vehicle applications. It is meant to serve as a guide toward a standard practice to promote software compatibility among microcomputer based modules. This document is to be used with SAE J1708. SAE J1708 defines the requirements for the hardware and basic protocol that is needed to implement this document.
标签: communicated the document messages
上传时间: 2013-12-09
上传用户:tedo811
This file (the project file) contains information at the project level and is used to build a single project or subproject. Other users can share the project (.dsp) file, but they
标签: project file information the
上传时间: 2013-12-18
上传用户:cainaifa
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
在交换机中,网络地地址nat配置方法。文档中详细说明了配置命令。
标签: 交换机
上传时间: 2017-01-21
上传用户:c12228
在网络中,交换机配置命令,详细说明了VLAN,ACL,NAT之间的配置。
标签: 网络
上传时间: 2017-01-21
上传用户:wuyuying
欢迎使用ERwin信息模型,以前如果你从未见过模型,ERwin Methods Guide将帮助你了解什么是模型,以及它适合于什么。如果你已经一些有使用数据和信息模型的经验,那么你知道它在业务需求中是很有用的。如果在设计新的信息系统或在维护和修改存在的东西,模型能帮助你。本文没有包括信息模型的许多细节。但是,到你读完它的时候,你将足够地了解它,即使你仅仅初学者,ERwin的方法也将为你工作。本文覆盖了由 ERwin支持的信息模型方法,它不包括了ERwin的详细使用,如何使用 ERwin工具请见”ERwin User s Guide”。由 ERwin支持的信息模型方法是神秘的缩写字:”IDEF1X”,IDEF1X方法由 U.S.空军开发。目前,它应用于空军、政府机构、航空工业和财政部门、大公司、大型企业。并且,信息模型在各种主要的管理严格的大公司是必需的。
上传时间: 2017-01-31
上传用户:恋天使569
Linux was first released into an unsuspecting world in the summer of 1991. Initially the spare-time hobby of a Finnish computer scientist by the name of Linus Torvalds, Linux was at first accessible only in software source code form to those with enough expertise to build and install it. Early enthusiasts (most also developers themselves by necessity) exploited the growth of the Internet in the early 1990s as a means to build online communities and drive development forward. These communities helped to build the first Linux software distributions, containing all the software components needed to install and use a Linux system without requiring users to be technical experts.
标签: unsuspecting spare-time Initially the
上传时间: 2013-12-12
上传用户:dianxin61
1、在Tomcat的Webapps目录下建立一个目录,例如oa。 2、将程序代码的build/web/目录下的全部文件复制到Tomcat的webapps目录下oa目录。 3、启动Tomcat 4、在地址栏中输入http://localhost:8080/oa 缺省用户: Robin 管理员, 密码:111111 RL 用户, 密码:222222 用户可以自己注册用户或者修改data目录下的users.xml文件。
上传时间: 2013-12-22
上传用户:小宝爱考拉