Network programming classes
-
Chương 4 - MFC Socket. Chương 4 trình bày những nội dung chính sau: Giới thiệu về MFC (Microsoft Foundation Classes), CSocket, CAsyncSocket. Mời các bạn cùng tham khảo để biết thêm chi tiết.
15p tieu_vu16 03-01-2019 43 6 Download
-
Manipulating URLs URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet. Sample structure of a URL. The resource name part may contain: host name, file
15p huanltgc00061 05-05-2013 51 4 Download
-
A java application can run inside a JVM and can only invoke the methods of the classes available inside this JVM • Distributed computing or processing resolves around clientserver technology where several client programs communicate with one or more server applications.An RMI application has to expose methods, which remote clients can invoke. • These methods which are meant to be remote, should be defined in an interface which extends the java.rmi.Remote interface
19p blackfalconbm 07-11-2012 100 38 Download
-
Các đặc điểm C++ áp dụng cho class Lập trình hướng đối tượng Tài liệu đọc Eckel, Bruce. Thinking in C++, 2nd Ed. Vol 1. ¨ Chapter n 8: Constants 10: Name Control Start at p. 352 (Classes) p. 423 (Static Members in C++) to p. 442 (Alternate Linkage Specifications) ¨ Chapter n n Dietel. C++ How to Program, 4th Ed. ¨ Chapter n 7: Class II 7.2, 7.3, 7.6, 7.7, 7.8 @ 2004 Trần Minh Châu. FOTECH. VNU 2 Tổng quan n Các đặc điểm cơ bản của C++ như const, static, ... áp dụng cho các lớp như thế nào? ¨ ¨ ¨ ¨ ¨ ¨ hằng thành viên – const member thành viên tĩnh – static member hằng thành..
15p hungsalem 25-02-2010 370 77 Download
-
The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You...
20p giangtanthon 10-02-2010 134 25 Download