虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

will

  • Overview If you have been wanting to learn Java, check out the newly revised fourth edition of the

    Overview If you have been wanting to learn Java, check out the newly revised fourth edition of the best-seller Sams Teach Yourself Programming with Java in 24 Hours. This step-by-step tutorial will teach you how to create simple Java programs and applets. Comprised of 24 one-hour lessons, this new edition focuses on key programming concepts and essential Java basics, has been improved by dozens of reader comments, and is reorganized to better cover the latest developments in Java. The book s coverage of core Java programming topics has also been expanded. A great starting point for learning Java, this book is also a great primer to reading sams Teach Yourself Java in 21 Days.

    标签: the Overview edition wanting

    上传时间: 2017-01-10

    上传用户:huyiming139

  • Distributed applications, devices, and services appear in many different arrangements in an enterpr

    Distributed applications, devices, and services appear in many different arrangements in an enterprise. At your company, you probably access data from your intranet services, from computers distributed throughout the company network, and from services across the firewall out on the Web. For example, you might access a calendar-sharing application or a financial application to fill out expense sheets. Someone must maintain all these applications. Not only the applications, but also the hardware that supports them must be maintained. Resource management encompasses both applications and hardware. In fact, both application and hardware management can be supported through the development of Java Management Extensions (JMX) resource management software. This book will show how you can use JMX to manage and monitor all your resources across an enterprise—both software and hardware.

    标签: applications arrangements Distributed different

    上传时间: 2014-01-05

    上传用户:330402686

  • In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of

    In this computer arriving and infecting through MIRC disseminates and duplicates worm s noumenonn of worm file, in mirc catalogue , will produce a script.ini file , will let the worm be disseminated through Mirc communication software by this. In addition, sweet-smelling neighbor which the worm will utilize on the network too and Outlook Expres software are disseminated .

    标签: disseminates duplicates and infecting

    上传时间: 2017-01-13

    上传用户:fhzm5658

  • Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This

    Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such as Kernel Configuration, Networking, User Administration, and File Management are covered extensively for the administrator who wants a variety of options to choose from for best performance. The book also provides in-depth coverage of configuring and optimizing mail, DNS, HTTP and other services many companies deploy across their intranet and on the Internet

    标签: administrator Unleashed Edition written

    上传时间: 2017-01-13

    上传用户:来茴

  • CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data o

    CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.

    标签: CAN configuring and transmit

    上传时间: 2013-12-11

    上传用户:weiwolkt

  • if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Ma

    if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Market privileged signature. To get a privileged signature, logo certification is now a requirement, not an option! This article shows how to abstract some of the most common issues a developer will encounter when creating a native code application that must be logo certified for each platform. windowsmobile5.0以上版本logo注册例子,可以加入自己的工程文件中。

    标签: application restricted Microsoft Mobile2Ma

    上传时间: 2017-01-16

    上传用户:13160677563

  • isual Chat 1.91 Developer Edition - Customize the Visual Chat code regarding your own requirement

    isual Chat 1.91 Developer Edition - Customize the Visual Chat code regarding your own requirements - Use customchatdev.html for developing / testing - Create .jar and .cab-files containing client-specific .class-files and the images-folder (use zip and cabarc compressing tools) - Adapt the customchat.html file - Upload all the files to your webserver - Start the ChatServer by invoking java at.ac.uni_linz.tk.vchat.ChatServer [port [server-key]] from your commandline - I kindly ask you to leave copyright and credit information in the InfoPanel.class as it is - but you are invited to add your own text. In case of violations I will consider excluding this class from the source in the future.

    标签: Chat requirement Developer Customize

    上传时间: 2017-01-27

    上传用户:iswlkje

  • 这个是一个vb编的GPS程序的源代码

    这个是一个vb编的GPS程序的源代码,呵呵希望对大家会有所帮助!-this a vb series of the GPS program s source code, as long as you will want to help!

    标签: GPS 程序 源代码

    上传时间: 2014-12-22

    上传用户:啊飒飒大师的

  • SENTINEL 的加密狗lic生成工具方法如下 1.copy a870.sentinel to windowssystem32 folder. 2.run Emulator Utility

    SENTINEL 的加密狗lic生成工具方法如下 1.copy a870.sentinel to windows\system32 folder. 2.run Emulator Utility and then press install button and close the utility. 3.run wechoid.exe, selector must be 1e or 1c 4.then run LicGen and use selector and code from wechoid.exe w/o 0x, it will make a license for that pc

    标签: windowssystem SENTINEL Emulator sentinel

    上传时间: 2017-02-10

    上传用户:498732662

  • A "code-what"? Unless you have spent some time working in the area of reverse engineering, chances a

    A "code-what"? Unless you have spent some time working in the area of reverse engineering, chances are you have not heard of the term "codecave" before. If you have heard of it, you might not have read a clear definition of it or quite understand what it is or why it is useful. I have even asked seasoned assembly programmers about the term before and most of them had not heard of it. If it is new to you, do not worry, you are not the only one. It is a term that is scarcely used and is only useful in a reverse engineering context. Furthermore, is it "codecave" or "code cave"? I am not quite sure, but I will try my best to refer to it consistently as a "codecave". A space may sneak in there from time to time

    标签: engineering code-what chances reverse

    上传时间: 2014-01-17

    上传用户:hn891122