Xem 1-20 trên 21 kết quả The java virtual machine.
  • The Design and Implementation of a Java Virtual Machine on a Cluster of Workstations by Carlos Daniel Cavanna Master of Applied Science Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto 2003

    pdf144p goshop_123 24-04-2013 13 5   Download

  • As the person who led the JavaSoft team that developed the Java security technology discussed in this book, it is extremely gratifying to see people spend their precious time writing about our technology and products. Every engineer’s dream is to have his or her technology deployed and used by thousands of others, and this book is a great help to Java developers who write security-aware applications.

    pdf50p tailieuvip14 26-07-2012 35 5   Download

  • The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposit.

    pdf702p bluesky_12 25-12-2012 33 12   Download

  • This book got its start as an experiment in modern technology. When I started teaching at my present university (1998), the organization and architecture course focused on the 8088 running MS-DOS—essentially a programming environment as old as the sophomores taking the class. (This temporal freezing is unfortunately fairly common; when I took the same class during my undergraduate days, the computer whose architecture I studied was only two years younger than I was.

    pdf334p hotmoingay3 09-01-2013 22 3   Download

  • Every day I read e-mails and articles dealing with computer security attacks and breaches, and the repercussions that follow. I have been getting onboard with computer security for decades, and there is no end in sight for this effort. Each and every professional in information technology has a commitment to keep with regard to computer security. We have, most of us, signed computing codes of conduct, and further we have aligned ourselves with those who protect the computing resources of our respective companies....

    pdf466p bachduong1311 12-12-2012 29 2   Download

  • Java là ngôn ngữ lập trình hướng đối tượng (tựa C++) do Sun Microsystem đưa ra vào giữa thập niên 90. Chương trình viết bằng ngôn ngữ lập trình java có thể chạy trên bất kỳ hệ thống nào có cài máy ảo java (Java Virtual Machine).

    pdf206p thaonhi 18-06-2009 5183 2474   Download

  • ava technology has evolved from a programming language designed to create machine-independent embedded systems into a robust, vendor-independent,machine-independent, server-side technology, enabling the corporate community to realize the full potential of eb-centric applications.

    pdf769p stumble 21-05-2009 487 220   Download

  • The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You...

    pdf20p giangtanthon 10-02-2010 83 23   Download

  • Language Lap trinh JAVA Java is the language programming direction objects (as C + +) do Sun Microsystem output to the first hex niên 90 the ky 20. Program Việt using Java can be running on any hệ system that have installed your virtual Java (JVM - Java Virtual Machine). Máy virtual Java (JVM - Java Virtual Machine): One programs write by Java will be compile ra mã of the virtual Java (mã java bytecode)

    ppt53p nguyenvanhabk1 04-09-2012 36 5   Download

  • Java là ngôn ngữ lập trình hướng đối tượng (như C++) do Sun Microsystem đưa ra vào đầu thập niên 90 của thế kỷ 20. Chương trình viết bằng Java có thể chạy trên bất kỳ hệ thống nào có cài máy ảo Java (JVM - Java Virtual Machine).

    ppt39p thephuong112 26-02-2014 18 3   Download

  • Speed. Aside from caffeine, nothing quickens the pulse of a programmer as much as the blazingly fast execution of a piece of code. How can we fulfill the need for computational speed? Moore’s law takes us some of the way, but multicore is the real future. To take full advantage of multicore, we need to program with concurrency in mind. In a concurrent program, two or more actions take place simultaneously. A concurrent program may download multiple files while performing computations and updating the database. We often write concurrent programs using threads in Java.

    pdf282p hotmoingay3 09-01-2013 27 2   Download

  • In this chapter, the following content will be discussed: Hardware terminology, main memory, auxiliary memory, drives, writing algorithms using pseudocode, programming language code, the compilation process for non-java programs, object code, portability, java virtual machine, the compilation process for java programs, history of java.

    ppt19p tangtuy06 01-04-2016 3 1   Download

  • Java là một nền tảng phát triển các ứng dụng phần mềm có vị trí rất lớn trong những năm cuối thế kỉ 20, đầu thế kỉ 21. Đánh dấu sự trưởng thành của mô hình lập trình hướng đối tượng, nó được coi là một nền tảng mang tính cách mạng trong ngành phần mềm. Mô hình máy ảo Virtual Machine đã cho phép các ứng dụng viết bằng Java có thể chạy trên nhiều hệ điều hành khác nhau.

    ppt70p soicon824 19-04-2011 94 24   Download

  • Learning Java is the most widely sought introduction to the programming language that's changed the way we think about computing. Our updated third edition takes an objective, no-nonsense approach to the new features in Java 5.0, some of which are drastically different from the way things were done in any previous versions. The most essential change is the addition of "generics", a feature that allows developers to write, test, and deploy code once, and then reuse the code again and again for different data types.

    pdf0p truongnghen 21-01-2013 19 3   Download

  • Interpreted computer programs — in a batch or interactive session — are either decoded and then immediately executed or are decoded into some efficient intermediate representation for future execution. BASIC, Perl, and Python are examples of immediately executed computer programs. Alternatively, Java computer programs are compiled ahead of time and stored as a machine independent code called bytecode. Bytecode is then executed on request by an interpreter called a virtual machine.

    pdf64p nt18102 25-05-2013 12 1   Download

  • Chapter 3 is concerned with the operating-system interfaces that users (or at least programmers) actually see: system calls. The treatment is somewhat vague since more detail requires picking a specific system to discuss. This chapter is best supplemented with exactly this detail for the specific system the students have at hand. Ideally they should study the system calls and write some programs making system calls.

    ppt39p tangtuy06 01-04-2016 5 1   Download

  • Ever since Java programmers have downloaded their first virtual machine, their ears have been glued to the ground, constantly on the lookout for tips and tricks for using the latest Java APIs. After all, there's nothing quite as satisfying as grasping a new technique for solving a common programming problem. Remember the first time you learned the power of Model-View-Controller (MVC), or developed your first singleton class? It was clear that someone out there had thought through the same problems you were having and, best of all, developed a solution that worked....

    pdf314p vantrungtran 03-02-2010 122 28   Download

  • The number of alerts the Threat Analyzer can display has a direct correlation to your system's memory. Since you can access the Central Manager from the local host or a remote connection, this depends on the machine used for the Central Manager logon. The memory overhead for alerts, including the code base and Java virtual machine, is approximately 1 KB per alert when there are at least 10,000 alerts in the Threat Analyzer (more KBs when there are fewer alerts). McAfee recommends 1 GB of RAM in your system which enables you to handle up to 1,000,000 total alerts. If...

    pdf47p cao_can 02-01-2013 18 4   Download

  • Oracle8i introduced the use of Java as a procedural language with a Java Virtual Machine (JVM) in the database (originally called JServer). JVM includes support for Java stored procedures, methods, triggers, Enterprise JavaBeans™ (EJBs), CORBA, and HTTP. The Accelerator is used for project generation, translation, and compila- tion, and can also be used to deploy/install shared libraries. The inclusion of Java within the Oracle database allows Java developers to leverage their skills as Oracle application developers.

    pdf67p nhacsihuytuan 13-04-2013 27 4   Download

  • Additional projects studied the transfer of contaminants from females to pups, the impact of contaminants on immune system function, seasonal movements, diving activity and the measurement of heart rate as an indication of energy expenditure. Scientists have also observed the seal hunt in order to collect data on the age composition of the harvest as well as on “struck and loss”. In any harvest, animals may be killed but not recovered and therefore not included in the reported landings, a factor referred to as “struck and loss”.

    pdf21p seketnoi 26-04-2013 26 2   Download

Đồng bộ tài khoản