虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Fire-Workflow-Engine-all-in-one

  • The source code samples for chapter 2, 4, 6, and 8 are contained in the EvenChapters project. Those

    The source code samples for chapter 2, 4, 6, and 8 are contained in the EvenChapters project. Those chapters all reference various aspects of this single project. The source code for the BullsEye control (chapter 10 example) is in the BullEyeCtl project. The source samples for the other chapters are provided in the Chapter XX sub-directories.

    标签: EvenChapters contained chapter samples

    上传时间: 2015-09-07

    上传用户:yuchunhai1990

  • In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts

    In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts with an introduction to Winsock and is specifically geared for the beginning Winsock programmer. This chapter covers all the basics and introduces Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through simple samples, as well as providing a roadmap to advanced Winsock topics covered in other chapters. For the sake of simplicity, Chapter 1 covers the IPv4 protocol.

    标签: the dedicated covering majority

    上传时间: 2015-09-08

    上传用户:ommshaggar

  • In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety o

    In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn t kept waiting any longer than necessary for the relatively slow disks.

    标签: thoroughly understand variety order

    上传时间: 2014-12-07

    上传用户:PresidentHuang

  • * "Copyright (c) 2006 Robert B. Reese ("AUTHOR")" * All rights reserved. * (R. Reese, reese@ece.

    * "Copyright (c) 2006 Robert B. Reese ("AUTHOR")" * All rights reserved. * (R. Reese, reese@ece.msstate.edu, Mississippi State University) * IN NO EVENT SHALL THE "AUTHOR" BE LIABLE TO ANY PARTY FOR * DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT * OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE "AUTHOR" * HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

    标签: Reese B. R. Copyright

    上传时间: 2015-09-24

    上传用户:mpquest

  • About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

    About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.

    标签: WepDecrypt Wepdecrypt Wireless guesses

    上传时间: 2013-12-25

    上传用户:6546544

  • bject Inspector is a component suite that contains inspectors allowing you to change anything in y

    bject Inspector is a component suite that contains inspectors allowing you to change anything in your application at runtime. Object Inspector suite includes: TPropertyInterface component for easy access to any property or event of any component at runtime TComponentInspector customizable full-functional runtime object inspector control TComponentComboBox control for easy selecting component TCommonInspector abstract inspector control for inspect anything in your application TDBInspector ready-to-use database inspector control TIniInspector ready-to-use ini-file inspector control TApplicationInspector ready-to-use inspector control for changing Application properties at runtime TSystemColorsInspector ready-to-use inspector control for changing Windows colors Examples small and clean projects illustrating features of inspectors and TPropertyInterface components Source codes full source code of all components and useful internal classes

    标签: inspectors Inspector component allowing

    上传时间: 2015-10-02

    上传用户:无聊来刷下

  • American Gladiator,You are consulting for a game show in which n contestants are pitted against n gl

    American Gladiator,You are consulting for a game show in which n contestants are pitted against n gladiators in order to see which contestants are the best. The game show aims to rank the contestants in order of strength this is done via a series of 1-on-1 matches between contestants and gladiators. If the contestant is stronger than the gladiator, then the contestant wins the match otherwise, the gladiator wins the match. If the contestant and gladiator have equal strength, then they are “perfect equals” and a tie is declared. We assume that each contestant is the perfect equal of exactly one gladiator, and each gladiator is the perfect equal of exactly one contestant. However, as the gladiators sometimes change from one show to another, we do not know the ordering of strength among the gladiators.

    标签: contestants consulting Gladiator are

    上传时间: 2013-12-18

    上传用户:windwolf2000

  • This thorough, hands-on reference for database developers and administrators delivers expert guidanc

    This thorough, hands-on reference for database developers and administrators delivers expert guidance on sophisticated uses of Transact-SQL (T-SQL)¡ ª one of the most familiar and powerful programming languages for SQL Server. Written by a T-SQL guru, this guide focuses on language features and how they are interpreted and processed by the SQL Server execution engine. You¡ ¯ ll get in-depth coverage of the sophisticated uses of T-SQL, including triggers, user-defined functions, exception handling, and more. The book explains and compares solutions to database-development problems in both SQL Server 2000 and SQL Server 2005, discussing the new T-SQL programming features added to SQL Server 2005 in detail. Includes extensive code samples, table examples, and logic puzzles to help database developers and administrators understand the intricacies and help promote mastery of T-SQL.

    标签: administrators developers reference thorough

    上传时间: 2013-12-29

    上传用户:Avoid98

  • This unit uses an array of bytes to represent a LARGE number. The number is binairy-stored in the ar

    This unit uses an array of bytes to represent a LARGE number. The number is binairy-stored in the array, with the Least Significant Byte (LSB) first and the Most Significant Byte (MSB) last, like all Intel-integer types.

    标签: number binairy-stored represent LARGE

    上传时间: 2015-10-08

    上传用户:xieguodong1234

  • A .NET Path Finder Library Path Finder Library is a .NET library that currently contains one type c

    A .NET Path Finder Library Path Finder Library is a .NET library that currently contains one type called SimplePathFinder. SimplePathFinder is a very simple and basic implementation of the A* path finding algorithm. It is extremely easy to use and integrate in your applications. It works very well and I hope you enjoy using it. 这是一个用C#实现的路径搜索算法,实现的了简单的A*算法!

    标签: Library Finder Path NET

    上传时间: 2013-12-14

    上传用户:hullow