Computer installation tips
-
Structured systems analysis and design method (SSADM) (originally released as methodology) is a systems approach to the analysis and design of information systems. SSADM was produced for the Central Computer and Telecommunications Agency (now Office of Government Commerce), a UK government office concerned with the use of technology in government, from 1980 onwards.
371p trada85 20-01-2013 73 11 Download
-
Microsoft Confidential Microsoft Enterprise and Support Training .Module 1 Objectives At the end of this module, you will be able to: Diagram how ASP scripts are tied in to ASP.DLL. Create basic script examples, demonstrating inline code or functions/subroutines. Microsoft Confidential Microsoft Enterprise and Support Training .Browsing HTML Microsoft Confidential Microsoft Enterprise and Support Training .
80p lotus_123 15-12-2012 59 8 Download
-
Certified with Leading OEM and ISV Products. ISV Independent Software Vendor. OEM Original Equipment Manufacturer. ABI/API Compatibility. Application Binary Interface. Application Programming Interface. ELF Executable and Linking Format. LSB Linux Standards Base. BEA BEA System Inc, San Jose, California. “Think Liquid”. HPC High Performance Computing.
281p rhca_92 09-11-2012 101 25 Download
-
Language Lap trinh JAVA Java is the language programming direction objects (as C + +) do Sun Microsystem output to the first hex niên 90 the ky 20. Program Việt using Java can be running on any hệ system that have installed your virtual Java (JVM - Java Virtual Machine). Máy virtual Java (JVM - Java Virtual Machine): One programs write by Java will be compile ra mã of the virtual Java (mã java bytecode)
53p nguyenvanhabk1 04-09-2012 83 6 Download
-
provide request information for HTTP servlets. The servlet container creates an HttpServletRequest object and passes it as an argument to the servlet's service methods (doGet, doPost, etc).Client request information including : parameter name and values, and an input stream Attributes : custom information about a request. Extends the ServletRequest interface Returns the value of attribute : public Object getAttribute(String name)
36p nguyenvanhabk1 04-09-2012 105 7 Download
-
‘java.sql’ and ‘javax.sql’ package SQL Interfaces for application JDBC Driver Manager manage two or more JDBC drivers ‘DriverManager’ class in the java.sql package. JDBC Driver API defined for connecting between the JDBC driver manager and JDBC drivers JDBC Driver access each database 4 types : JDBCODBC bridge Native API partly – Java technologybased driver Netprotocol all Java technologybased driver
38p nguyenvanhabk1 04-09-2012 106 11 Download
-
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of security.Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks......
41p 260786 25-11-2009 282 113 Download