detailed description of network driver design for uclinux. It s quite good for the understanding the work flow of ethernet driver in uclinux
標簽: understanding description for the
上傳時間: 2014-06-17
上傳用戶:rocketrevenge
Jtag schematic for embemed system design. It support parallel port connected to jtag.
標簽: schematic connected parallel embemed
上傳時間: 2014-12-05
上傳用戶:chens000
This is a lecure on windows ce driver design by Jay Loney,the Program Manager of microsoft windows ce
標簽: windows microsoft Program Manager
上傳時間: 2014-12-06
上傳用戶:BIBI
a very excellent document about j2ee web services,show you the principle and methads to design web pragrams under j2
標簽: excellent principle web document
上傳時間: 2013-12-25
上傳用戶:水口鴻勝電器
DESIGN OF A MULTIPLEXING SYSTEM FOR TELEMETRY 個人論文
標簽: MULTIPLEXING TELEMETRY DESIGN SYSTEM
上傳時間: 2016-01-03
上傳用戶:maizezhen
This book shows how to design and implement C++ software that is more effective: more likely to behave correctly more robust in the face of exceptions more efficient more portable makes better use of language features adapts to change more gracefully works better in a mixed-language environment is easier to use correctly is harder to use incorrectly. In short, software that s just better.
標簽: more effective implement software
上傳時間: 2016-01-04
上傳用戶:huyiming139
PDMS,Plant Design Management System工廠三維設計管理系統培訓手冊.
標簽: Management Design System Plant
上傳時間: 2016-01-06
上傳用戶:qlpqlq
Ti Davinci (DM644x)基于WINCE的開發 Design conference 大會的培訓課件
標簽: conference Davinci Design WINCE
上傳時間: 2016-01-07
上傳用戶:372825274
《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上傳時間: 2016-01-07
上傳用戶:zxc23456789
Multirate filter design and simulation using MATLAB.
標簽: simulation Multirate MATLAB filter
上傳時間: 2016-01-07
上傳用戶:gmh1314