Linux in a Nutshell, 5th Edition By Stephen Figgins, Robert Love, Arnold Robbins, Ellen Siever, Aaron Weber ... ... ... ... ... ... ... ..... Publisher: O Reilly Pub Date: July 2005 ISBN: 0-596-00930-5 Pages: 944 Over the last few years, Linux has grown both as an operating system and a tool for personal and business use. Simultaneously becoming more user friendly and more powerful as a back-end system, Linux has achieved new plateaus: the newer filesystems have solidified, new commands and tools have appeared and become standard, and the desktop--including new desktop environments--have proved to be viable, stable, and readily accessible to even those who don t consider themselves computer gurus.
標簽: Nutshell Edition Figgins Stephen
上傳時間: 2015-12-03
上傳用戶:frank1234
This document contains a general overview in the first few sections as well as a more detailed reference in later sections for SVMpython. If you re already familiar with SVMpython, it s possible to get a pretty good idea of how to use the package merely by browsing through svmstruct.py and multiclass.py. This document provides a more in depth view of how to use the package. Note that this is not a conversion of SVMstruct to Python. It is merely an embedding of Python in existing C code. All code other than the user implemented API functions is still in C, including optimization.
標簽: document contains detailed overview
上傳時間: 2013-12-14
上傳用戶:希醬大魔王
Sun公司Dream項目,DReaM-MMI protocol provides a method for ascertaining rights between a DRM client and server.
上傳時間: 2013-12-15
上傳用戶:離殤
B/S版ERP安裝方法 1、安裝IIS5.0、Microsoft .NET Framework 1.1及SQL Server2000 2、將目錄Copy_of_ERP和webctrl_client復制到C:/Inetpub/wwwroot下,并將Copy_of_ERP目錄設置成IIS虛擬目錄 3、在SQL Server2000中新建一個Storage用戶和LXTXERP數據庫,然后將Data目錄中的LXTXERP.BAK數據庫備份文件還原 4、修改Copy_of_ERP目錄下的Web.config文件的連接屬性sa用戶的密碼: <add key="mydns" value="data source=(local) initial catalog=LXTXERP persist security info=False user id=sa pwd=123 workstation id=jl packet size=4096" /> 5、在Windows管理工具中打開Internet 服務管理器,運行Copy_of_ERP中的Login.aspx打開ERP登錄頁面,默認用戶:admin 密碼:123 6、OK
標簽: webctrl_clie Copy_of_ERP Framework Microsoft
上傳時間: 2015-12-09
上傳用戶:zhuimenghuadie
The Chinese promises the tower question is the most classical recursion question, this question has designed this game, alternately plays by the user and automatically demonstrates two parts to be compose
標簽: question classical the recursion
上傳時間: 2013-12-19
上傳用戶:ryb
該程序將鍵盤輸入的字符串與機內設定的字符串比較,若相同,則顯示“OK”,否則顯示“illegal user” 程序中有詳細注釋。
上傳時間: 2013-12-18
上傳用戶:anng
《JavaServer Faces》 In JavaServer Faces, developers learn how to use the new JavaServer Faces framework to build real-world web applications. The book contains everything you ll need: how to construct the HTML on the front end how to create the user interface components that connect the front end to your business objects how to write a back-end that s JSF-friendly and how to create the deployment descriptors that tie everything together. This book is a complete guide to the crucial new JSF technology.
標簽: JavaServer Faces developers framew
上傳時間: 2016-01-02
上傳用戶:redmoons
Anyone who interacts with today s modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for application developers and others who can write SQL code efficiently and correctly.
標簽: Structured interacts databases Language
上傳時間: 2016-01-02
上傳用戶:qlpqlq
Robotics TOOLBOX The Toolbox provides many functions that are useful in robotics including such things as kinematics, dynamics, and trajectory generation. The Toolbox is useful for simulation as well as analyzing results from experiments with real robots. Have fun with the toolbox. It is self-explanatory and very (robotics) user friendly...see the robot.pdf
標簽: functions including Robotics provides
上傳時間: 2014-12-06
上傳用戶:yyyyyyyyyy
《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上傳時間: 2016-01-07
上傳用戶:zxc23456789