The source code samples for chapter 2, 4, 6, and 8 are contained in the EvenChapters project. Those chapters all reference various aspects of this single project. The source code for the BullsEye control (chapter 10 example) is in the BullEyeCtl project. The source samples for the other chapters are provided in the Chapter XX sub-directories.
标签: EvenChapters contained chapter samples
上传时间: 2015-09-07
上传用户:yuchunhai1990
In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts with an introduction to Winsock and is specifically geared for the beginning Winsock programmer. This chapter covers all the basics and introduces Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through simple samples, as well as providing a roadmap to advanced Winsock topics covered in other chapters. For the sake of simplicity, Chapter 1 covers the IPv4 protocol.
标签: the dedicated covering majority
上传时间: 2015-09-08
上传用户:ommshaggar
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn t kept waiting any longer than necessary for the relatively slow disks.
标签: thoroughly understand variety order
上传时间: 2014-12-07
上传用户:PresidentHuang
* "Copyright (c) 2006 Robert B. Reese ("AUTHOR")" * All rights reserved. * (R. Reese, reese@ece.msstate.edu, Mississippi State University) * IN NO EVENT SHALL THE "AUTHOR" BE LIABLE TO ANY PARTY FOR * DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT * OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE "AUTHOR" * HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
上传时间: 2015-09-24
上传用户:mpquest
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
标签: WepDecrypt Wepdecrypt Wireless guesses
上传时间: 2013-12-25
上传用户:6546544
bject Inspector is a component suite that contains inspectors allowing you to change anything in your application at runtime. Object Inspector suite includes: TPropertyInterface component for easy access to any property or event of any component at runtime TComponentInspector customizable full-functional runtime object inspector control TComponentComboBox control for easy selecting component TCommonInspector abstract inspector control for inspect anything in your application TDBInspector ready-to-use database inspector control TIniInspector ready-to-use ini-file inspector control TApplicationInspector ready-to-use inspector control for changing Application properties at runtime TSystemColorsInspector ready-to-use inspector control for changing Windows colors Examples small and clean projects illustrating features of inspectors and TPropertyInterface components Source codes full source code of all components and useful internal classes
标签: inspectors Inspector component allowing
上传时间: 2015-10-02
上传用户:无聊来刷下
American Gladiator,You are consulting for a game show in which n contestants are pitted against n gladiators in order to see which contestants are the best. The game show aims to rank the contestants in order of strength this is done via a series of 1-on-1 matches between contestants and gladiators. If the contestant is stronger than the gladiator, then the contestant wins the match otherwise, the gladiator wins the match. If the contestant and gladiator have equal strength, then they are “perfect equals” and a tie is declared. We assume that each contestant is the perfect equal of exactly one gladiator, and each gladiator is the perfect equal of exactly one contestant. However, as the gladiators sometimes change from one show to another, we do not know the ordering of strength among the gladiators.
标签: contestants consulting Gladiator are
上传时间: 2013-12-18
上传用户:windwolf2000
This thorough, hands-on reference for database developers and administrators delivers expert guidance on sophisticated uses of Transact-SQL (T-SQL)¡ ª one of the most familiar and powerful programming languages for SQL Server. Written by a T-SQL guru, this guide focuses on language features and how they are interpreted and processed by the SQL Server execution engine. You¡ ¯ ll get in-depth coverage of the sophisticated uses of T-SQL, including triggers, user-defined functions, exception handling, and more. The book explains and compares solutions to database-development problems in both SQL Server 2000 and SQL Server 2005, discussing the new T-SQL programming features added to SQL Server 2005 in detail. Includes extensive code samples, table examples, and logic puzzles to help database developers and administrators understand the intricacies and help promote mastery of T-SQL.
标签: administrators developers reference thorough
上传时间: 2013-12-29
上传用户:Avoid98
This unit uses an array of bytes to represent a LARGE number. The number is binairy-stored in the array, with the Least Significant Byte (LSB) first and the Most Significant Byte (MSB) last, like all Intel-integer types.
标签: number binairy-stored represent LARGE
上传时间: 2015-10-08
上传用户:xieguodong1234
A .NET Path Finder Library Path Finder Library is a .NET library that currently contains one type called SimplePathFinder. SimplePathFinder is a very simple and basic implementation of the A* path finding algorithm. It is extremely easy to use and integrate in your applications. It works very well and I hope you enjoy using it. 这是一个用C#实现的路径搜索算法,实现的了简单的A*算法!
上传时间: 2013-12-14
上传用户:hullow