虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

they

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Referenc

    Eclipse+Web开发从入门到精通 These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested.

    标签: Complete Referenc listings Eclipse

    上传时间: 2017-01-20

    上传用户:as275944189

  • These files contain all of the code listings in Java 2: The Complete Reference The source cod

    These files contain all of the code listings in Java 2: The Complete Reference The source code is organized into files by chapter. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested. The code for Scrabblet is in its own ZIP file, called CHAP32.ZIP.

    标签: The Reference Complete listings

    上传时间: 2013-11-29

    上传用户:3到15

  • 复接入

    复接入,B/W双用户使用直接扩频序列 % >>>multiple access b/w 2 users using DS CDMA % >>>format is : cdmamodem(user1,user2,snr_in_dbs) % >>>user1 and user2 are vectors and they should be of equal length % >>>e.g. user1=[1 0 1 0 1 0 1] , user2=[1 1 0 0 0 1 1],snr_in_dbs=-50 % >>>or snr_in_dbs=50 just any number wud do % Waqas Mansoor % NUST , Pakistan

    标签:

    上传时间: 2014-11-22

    上传用户:zl5712176

  • This taglib contains tags used to create struts input forms, as well as other tags generally useful

    This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces. Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combination of tag attributes). JSP allows you to declare an "error page" in the <%@ page %> directive. If you wish to process the actual exception that caused the problem, it is passed to the error page as a request attribute under key org.apache.struts.action.EXCEPTION.

    标签: tags generally contains taglib

    上传时间: 2017-02-21

    上传用户:dianxin61

  • With the advances in the semiconductor and communication industries, it has become increasingly imp

    With the advances in the semiconductor and communication industries, it has become increasingly important for electrical engineers to develop a good understanding of microelectronics. This book addresses the need for a text that teaches microelectronics from a modern and intuitive perspective. Guided by my industrial, research, and academic experience, I have chosen the topics, the order, and the depth and breadth so as to efficiently impart analysis and design principles that the students will find useful as they enter the industry or graduate school.

    标签: communication semiconductor increasingly industries

    上传时间: 2013-12-19

    上传用户:evil

  • Written by Microsoft software legend Juval Lowy, Programming WCF Services is the authoritative intro

    Written by Microsoft software legend Juval Lowy, Programming WCF Services is the authoritative introduction to Microsoft s new, and some say revolutionary, unified platform for developing service-oriented applications [SOA] on Windows. Relentlessly practical, the book delivers insight, not documentation, to teach developers what they need to know to build the next generation of SOAs.

    标签: authoritative Programming Microsoft Services

    上传时间: 2013-12-26

    上传用户:Shaikh

  • Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Draw

    Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Drawing on Lopp s management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other. It is a place full of dysfunctional bright people who are in an incredible hurry to find the next big thing so they can strike it rich and then do it all over again. Among these people are managers, a strange breed of people who through a mystical organizational ritual have been given power over your future and your bank account. Whether you re an aspiring manager, a current manager, or just wondering what the heck a manager does all day, there is a story in this book that will speak to you. You will learn: * What to do when people start yelling at each other * How to perform a diving save when the best engineer insists on resigning * How to say "No" to the person who signs your paycheck

    标签: selection Managing Michael Humans

    上传时间: 2014-11-28

    上传用户:1427796291

  • Introduction Sometimes you may collide with the following problem: a third-party binary component o

    Introduction Sometimes you may collide with the following problem: a third-party binary component or control embedded into your application displays windows (usually message boxes) that hang your code until they are closed. If you do not have the source code of this binary and one does not have a good API to change one’s bad behaviour programmatically, it can be a real headache using the one. A famous example of such a binary is the WebBrowser control in .NET.

    标签: Introduction third-party Sometimes following

    上传时间: 2013-12-31

    上传用户:pinksun9

  • OpenOffice.org document containing: List of codes i have tested on a JinPeng C2000 mobile and the

    OpenOffice.org document containing: List of codes i have tested on a JinPeng C2000 mobile and their results. Some works, others not it is explained what code does if work. they are introduced where you type digits when making a call, unless specify it is not necesary to press call, like for wellknown *#06# -> that shows IMEI.

    标签: OpenOffice containing document JinPeng

    上传时间: 2013-12-13

    上传用户:BIBI