detailed description of network driver design for uclinux. It s quite good for the understanding the work flow of ethernet driver in uclinux
标签: understanding description for the
上传时间: 2014-06-17
上传用户:rocketrevenge
Jtag schematic for embemed system design. It support parallel port connected to jtag.
标签: schematic connected parallel embemed
上传时间: 2014-12-05
上传用户:chens000
This is a lecure on windows ce driver design by Jay Loney,the Program Manager of microsoft windows ce
标签: windows microsoft Program Manager
上传时间: 2014-12-06
上传用户:BIBI
a very excellent document about j2ee web services,show you the principle and methads to design web pragrams under j2
标签: excellent principle web document
上传时间: 2013-12-25
上传用户:水口鸿胜电器
DESIGN OF A MULTIPLEXING SYSTEM FOR TELEMETRY 个人论文
标签: MULTIPLEXING TELEMETRY DESIGN SYSTEM
上传时间: 2016-01-03
上传用户:maizezhen
This book shows how to design and implement C++ software that is more effective: more likely to behave correctly more robust in the face of exceptions more efficient more portable makes better use of language features adapts to change more gracefully works better in a mixed-language environment is easier to use correctly is harder to use incorrectly. In short, software that s just better.
标签: more effective implement software
上传时间: 2016-01-04
上传用户:huyiming139
PDMS,Plant Design Management System工厂三维设计管理系统培训手册.
标签: Management Design System Plant
上传时间: 2016-01-06
上传用户:qlpqlq
Ti Davinci (DM644x)基于WINCE的开发 Design conference 大会的培训课件
标签: conference Davinci Design WINCE
上传时间: 2016-01-07
上传用户:372825274
《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上传时间: 2016-01-07
上传用户:zxc23456789
Multirate filter design and simulation using MATLAB.
标签: simulation Multirate MATLAB filter
上传时间: 2016-01-07
上传用户:gmh1314