Xem 1-20 trên 163 kết quả Coding the networking
  • Learn the Coding Secrets of Master iPhone Designers and Developers iPhone Cool Projects Gary Bennett | Wolfgang Ante Neil Mix | Steven Peterson | Mike Ash | Benjamin Jackson | Matthew “Canis” Rosenfeld ..iPhone Cool Projects DAVE MARK, SERIES EDITOR GARY BENNETT WOLFGANG ANTE MIKE ASH BENJAMIN JACKSON NEIL MIX STEVEN PETERSON MATTHEW “CANIS” ROSENFELD .iPhone Cool Projects Copyright © 2009 by Gary Bennett, Wolfgang Ante, Mike Ash, Benjamin Jackson, Neil Mix, Steven Peterson, Matthew “Canis” Rosenfeld All rights reserved.

    pdf234p tiramisu0908 15-10-2012 21 3   Download

  • Most modern programming languages provide support for some type of object that can hold a variable number of elements. These objects are referred to as collections, and they can have elements added and removed with ease without having to worry about proper memory allocation. If you’ve programmed with classic ASP before, you’re probably familiar with the Scripting.Dictionary object, a collection object that references each element with a textual key. A collection that stores objects in this fashion is known as a hash table.

    pdf108p phongthinh 07-08-2009 284 32   Download

  • At cats' green on the Sunday he took the message from the inside of the pillar and added Peter Moran's name to the two names already printed there in the "Brontosaur" code. The message now read: “Leviathan to Dragon: Martin Hillman, Trevor Allan, Peter Moran: observe and tail.” What was the good of it John hardly knew. He felt better, he felt that at last he had made an attack on Peter Moran instead of waiting passively and effecting no retaliation. Besides, what was the use of being in possession of the key to the codes if he never took...

    ppt22p muathu_102 28-01-2013 23 3   Download

  • A PEAR-ified version of Useful Inc's XML-RPC for PHP. It has support for HTTP/HTTPS transport, proxies and authentication. This release is security related, and solves the recently discovered, and widespread remote-code-execution vulnerability. All users are strongly encouraged to upgrade immediately.

    pdf68p thutrang 17-08-2009 240 161   Download

  • ASP.NET makes application development much easier than it was with classic ASP, and hence it has dramatically improved developers' productivity. ASP.NET enables you to provide richer functionality to your Web applications by writing the least amount of code. The best part is that ASP.NET enables you to select any of the available .NET programming languages. So, unlike classic ASP, in which you had to depend on interpreted VBScript and JScript languages, ASP.NET provides a wide choice of programming languages....

    pdf686p huyhoang 07-08-2009 174 93   Download

  • Digital communications is a rapidly advancing applications area. Significant current activities are in the development of mobile communications equipment for personal use, in the expansion of the available bandwidth (and hence information carrying capacity) of the backbone transmission structure through developments in optical fibre, and in the ubiquitous use of networks for data communications.

    pdf1073p meoyeuagu 21-05-2013 44 26   Download

  • This module explains how to use methods, parameters, and overloaded methods. It also explains that breaking program logic into functional units is good design and makes it easier to reuse code. The module begins with an explanation of what methods are, how they are created, and how they can be called. The module briefly describes private and public access modifiers (which are discussed more fully in later modules). The module concludes with an explanation of method overloading and the rules regarding method signatures....

    pdf54p vuthuong 11-08-2009 74 22   Download

  • The extensively revised and updated edition provides a logical and easy-to-follow progression through C++ programming for two of the most popular technologies for artificial intelligence--neural and fuzzy programming. The authors cover theory as well as practical examples, giving programmers a solid foundation as well as working examples with reusable code.

    pdf454p goshop_123 24-04-2013 55 22   Download

  • Threats and Mitigation Conventional Cryptography and Kerberos Public Key Cryptography and SSL Windows Security 101: Basics Windows Security 102: Impersonation and Delegation Code Access Security Part 1, Policy Code Access Security Part 2, Enforcement Securing Web Applications Securing Web Services Securing System.Runtime.Remoting Securing COM+ Dumb Code: avoid writing code with silly security holes

    pdf368p goldit 09-10-2010 82 19   Download

  • Các HyperText Transfer Protocol (HTTP) là một giao thức ứng dụng cấp cho phân phối, hợp tác, hệ thống thông tin hypermedia. Nó là một giao thức chung chung không quốc tịch có thể được sử dụng cho nhiều nhiệm vụ (ví dụ, máy chủ tên đối tượng và phân phối hệ thống quản lý) ngoài việc sử dụng nó cho các siêu văn bản thông qua phần mở rộng của các phương pháp theo yêu cầu của nó, các mã lỗi, và phần đầu...

    pdf3p kaka 28-07-2010 64 18   Download

  • I gave them as good a brain dump as I could on each topic. They sat raptly and asked intelligent follow-up questions. These were smart kids, mind you: usually top computer science graduates and plenty of experienced programmers. But for all their coding skills, they didn’t really know the first thing about making a business successful. Which is OK. They’ll learn. It’s not that hard.

    pdf440p namde02 08-03-2013 60 13   Download

  • Software security is gaining momentum as security professionals realize that computer security is really all about making software behave. The publication of Building Secure Software in 2001 (Viega and McGraw) unleashed a number of related books that have crystallized software security as a critical field. Already, security professionals, software developers, and business leaders are resonating with the message and asking for more.

    pdf597p vinhnghi 26-08-2009 88 12   Download

  • This best-selling, easy to read book offers the most complete discussion on the theories and principles behind today's most advanced communications systems. Throughout, Haykin emphasizes the statistical underpinnings of communication theory in a complete and detailed manner. Readers are guided though topics ranging from pulse modulation and passband digital transmission to random processes and error-control coding. The fifth edition has also been revised to include an extensive treatment of digital communications....

    pdf384p beobobeo 01-08-2012 31 12   Download

  • This book explains the basic components, technologies used, and operation of IS-95 CDMA systems. You will discover why mobile telephone service providers have upgraded from 1st generation analog systems to more efficient and feature rich 2nd generation system. You will also discover how 2nd generation systems are gradually evolving into 3rd generation broadband multimedia systems. This book starts with the system components and basic services that the IS-95 CDMA system can provide.

    pdf192p beobobeo 01-08-2012 35 11   Download

  • No programmer, no matter how good (s)he is, writes bug−free code all the time. And so, most programming languages come with built−in capabilities to catch errors and take remedial action. This action could be something as simple as displaying an error message, or as complex as heating your computer's innards until they burst into flame (just kidding!) Over the next couple of pages, we're going to look at some of the error−management techniques available in JSP, and also demonstrate some of the JSP directives used to integrate standalone JavaBeans into your JSP scripts....

    pdf15p trungha 31-08-2009 35 10   Download

  • Một trong những điều tốt nhất về cách sử dụng Mozilla như là một khuôn khổ phát triển ứng dụng là bạn không cần phải tham gia bằng nguồn Mozilla code để tạo ra một ứng dụng Mozilla. Một Mozilla nhị phân đơn giản mà bạn tải về và cài đặt là nền tảng phát triển duy nhất mà bạn cần. Bạn có thể tạo và sử dụng hầu hết các thủ tục và các mẫu mô tả trong cuốn sách này với một phiên bản biên dịch sẵn của trình duyệt. ...

    pdf22p kaka 28-07-2010 47 10   Download

  • Ever since Sun Microsystems (aka "the dot in dot−com") came up with Java, the geeks have been screaming themselves hoarse about the wonders of this technology. Terms like "platform−independent code" and "write once, run anywhere" have been given so much airplay that even novice Java developers are aware of them, and the language is also popular with talk−show pundits and Internet consultants, who tout it as the solution to almost all problems of cross−platform compatibility.

    pdf16p trungha 31-08-2009 67 9   Download

  • The Developer exam is challenging. There are a lot of complex design issues to consider, and a host of advanced Java technologies to understand and implement correctly. The exam assessors work under very strict guidelines. You can create the most brilliant application ever to grace a JVM, but if you don’t cross your t’s and dot your i’s the assessors have no choice but to deduct crucial (and sometimes substantial) points from your project.

    pdf14p dmptit 04-11-2010 67 9   Download

  • There are several key aspects of GUI design that you need to consider when designing and implementing the GUI for your project. At a high level, they can be broken down into two main areas of focus: 1. Designing the GUI to be usable and friendly from the end user’s perspective. 2. Designing and implementing the GUI to be reliable, and maintainable from the programmer’s perspective. This chapter will focus almost entirely on the first point—ease of use for the end user. We start with a very brief overview of the technical issues you probably want to address in implementing your...

    pdf22p dmptit 04-11-2010 58 9   Download

  • The IMS supports several end-to-end QoS models (described in 3GPP TS 23.207 [13]). Terminals can use link-layer resource reservation protocols (e.g., PDP Context Activation), RSVP, or DiffServ codes directly. Networks can use DiffServ or RSVP. The most common model when cellular terminals are involved is to have terminals use link-layer protocols and to have the GGSN map link-layer resource reservation flows to DiffServ codes in the network. As mentioned in Chapter 8, the PCC (Policy and Charging Control) architecture includes QoS control.

    pdf5p 0984272663 27-04-2011 43 9   Download

Đồng bộ tài khoản