Xem 1-5 trên 5 kết quả Custom application blocks
  • The Definitive Guide to the Microsoft Enterprise Library introduces one of the most exciting and popular .NET–oriented initiatives, the Enterprise Library. The EL offers eight application blocks and other reusable code that are used to solve a variety of common problem spaces. These problems cover a number of topics, including data access, exception handling, caching, logging, security, cryptography, validation, policy injection and configuration.

    pdf50p ken333 07-06-2012 53 12   Download

  • We live in the data age. It’s not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the “digital universe” at 0.18 zettabytes in 2006 and is forecasting a tenfold growth by 2011 to 1.8 zettabytes.1 A zettabyte is 1021 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion terabytes. That’s roughly the same order of magnitude as one disk drive for every person in the world.

    pdf686p bachduong1311 12-12-2012 47 10   Download

  • Design a complete VoIP or analog PBX with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy with a detailed roadmap to installing, configuring, and integrating this open source software into your existing phone system. Ideal for Linux administrators, developers, and power users, this updated edition shows you how to write a basic dialplan step-by-step, and quickly brings you up to speed on the latest features in Asterisk 11. You’ll quickly gain working knowledge to build a simple, but complete system....

    pdf734p possibletb 28-11-2012 42 5   Download

  • This tab allows you to select a policy for client firewalls to use and the mode they are to run in. By default, a firewall runs in background mode to eliminate user interference, save system resources, and for a systems administrator to block unwanted traffic or content in a way that's completely hidden from a user. The default policy is Allow most. If some of a user’s custom applications that require network access are blocked and you consider the user experienced enough to manage all the network access request messages, you can turn the background mode off and enable Rules...

    pdf16p khongmuonnghe 04-01-2013 17 2   Download

  • Features • The original IDC termination block system • Can be custom configured to meet specific application requirements • Available in 8- and 10-pair configurations • Unique center port design allows for patching or testing without removing cross-connect wires or disrupting the circuit • Versatile mounting hardware allows mounting on wall, in racks, etc. • Comprehensive labeling options

    pdf79p halanh 14-08-2009 25 2   Download

Đồng bộ tài khoản