A fairly conventional 3D matrix object that can transform sets of 3D points and perform a variety of manipulations on the transform
標簽: conventional transform perform variety
上傳時間: 2015-12-04
上傳用戶:thesk123
SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
標簽: 1590592190 Distilled Security Edition
上傳時間: 2015-12-25
上傳用戶:hj_18
This example streams input from a ADC source to a DAC. An analog signal is acquired block-by-block into SDRAM from the ADC (an AD9244 in this example). The frames are then output with a one-frame delay to the DAC (an AD9744 in this example). In this example, no processing is done on the frames. They are passed unaltered.
標簽: block-by-block acquired example streams
上傳時間: 2015-12-29
上傳用戶:bjgaofei
VC6.0核心編程。主要涉及到windows消息,框架,mfc庫以及相關編程,com,activex技術,數據庫技術,網絡編程技術。為英文版本。 The 6.0 release of Visual C++ shows Microsoft s continued focus on Internet technologies and COM, which are key components of the new Windows Distributed interNet Application Architecture (DNA). In addition to supporting these platform initiatives, Visual C++ 6.0 also adds an amazing number of productivity-boosting features such as Edit And Continue, IntelliSense, AutoComplete, and code tips. These features take Visual C++ to a new level. We have tried to make sure that this book keeps you up to speed on the latest technologies being introduced into Visual C++.
上傳時間: 2016-01-02
上傳用戶:lmeeworm
《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上傳時間: 2016-01-07
上傳用戶:zxc23456789
TOOL (Tiny Object Oriented Language) is an easily-embedded, object-oriented, C++-like-language interpreter. The language, and indeed a significant part of the core of the TOOL engine, is based on the BOB project, a work that was originally developed by David Betz covered in previously published issues of Dr. Dobb s Journal.
標簽: easily-embedded object-oriented like-language Language
上傳時間: 2016-01-30
上傳用戶:ainimao
thinkinjava2English Thinking in Java, 2nd Edition, Release 11 To be published by Prentice-Hall mid-June, 2000 Bruce Eckel, President, MindView, Inc. Planet PDF brings you the Portable Document Format (PDF) version of Thinking in Java (2nd Edition). Planet PDF is the premier PDF-related site on the web. There is news, software, white papers, interviews, product reviews, Web links, code samples, a forum, and regular articles by many of the most prominent and respected PDF experts in the world. Visit our sites for more detail: http://www.planetpdf.com/ http://www.codecuts.com/ http://www.pdfforum.com/ http://www.pdfstore.com/
標簽: thinkinjava2English Prentice-Hall published Thinking
上傳時間: 2014-01-15
上傳用戶:ANRAN
Ink Blotting One method for escaping from a maze is via ‘ink-blotting’. In this method your starting square is marked with the number ‘1’. All free, valid squares north, south, east and west around the number ‘1‘ are marked with a number ‘2’. In the next step, all free, valid squares around the two are marked with a ‘3’ and the process is repeated iteratively until : The exit is found (a free square other than the starting position is reached on the very edge of the maze), or, No more free squares are available, and hence no exit is possible.
標簽: method ink-blotting Blotting escaping
上傳時間: 2014-12-03
上傳用戶:123啊
這是linux下的進化計算的源代碼。 === === === === === === === === === === === ===== check latest news at http://eodev.sourceforge.net/ ======================================================================= Welcome to EO, the Evolving Objects library. The latest news about EO can be found on the sourceforge repository at http://eodev.sourceforge.net/ In case of any problem, please e-mail us at eodev-help@lists.sourceforge.net, eodev@egroups.com To get started, take a look at the tutorial, starting with ./tutorial/html/eoTutorial.html The easiest way to start programming a new genome with all EO evolution engines handy is to create a new standalone EO project from the tutorial/Templates/ directory. Read Lesson 5 of the tutorial for an introduction )
上傳時間: 2013-12-23
上傳用戶:jkhjkh1982
Make a graph from database record and either send it to a printer directly selecting many print options or copy it in any file on disc. This project also gives you print preview option for A4 size paper and you can set your graph anywhere on the page.Also if you want to change graph s height or width you can change.Zooming effect is also given using hsrollbar.
標簽: selecting database directly printer
上傳時間: 2016-02-06
上傳用戶:s363994250