MFC Black Book
Introduction:
Are you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting things done their way. Me, I’m in the second group. If you are in the same boat (or would like to be) this book is for you.
This book won’t teach you MFC—not in the traditional sense. You should pick it up with a good understanding of basic MFC programming and a desire to do things differently. This isn’t a Scribble tutorial (although I will review some fundamentals in the first chapter). You will learn how to wring every drop from your MFC programs. You’ll discover how to use, abuse, and abandon the document/view architecture. If you’ve ever wanted custom archives, you’ll find that, too.
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn t kept waiting any longer than necessary for the relatively slow disks.
Visual C++
Windows Shell Programming
Welcome to Visual C++ Windows Shell Programming! With this book, you ll learn how to program the
Windows Shell, customize its behavior and integrate your applications with it. You ll discover how to
use and modify its features to best effect, and the way to call shell API functions whose
documentation is scant. Programming the shell isn t difficult, but few books explain the subject in its
entirety.
/*
* The internal form of a hash table.
*
* The table is an array indexed by the hash of the key collisions
* are resolved by hanging a linked list of hash entries off each
* element of the array. Although this is a really simple design it
* isn t too bad given that pools have a low allocation overhead.
*/
split from apache for general usage
三星公司官方 GIVEIO.SYS源代碼下載。
In windows NT/2000/XP, any application can’t access the I/O such as the parallel port. So, GIVEIO.SYS enables
SJF.exe to access the parallel port without any memory fault. In windows 95/98, GIVEIO.SYS isn’t needed.
Advanced UNIX Programming is the long-awaited (19 years!) update to the 1985 original. Maybe "update" isn t the right word--of the 750-or-so pages in the new book, there are maybe two dozen paragraphs that are unchanged. The original covered about 70 system calls, and the new one covers about 300. (這是Advanced UNIX Programming的附書源碼)
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. Changing hardware design isn t inherently suspicious, but the
leading trusted computing proposals have a high cost: they provide security to users
while giving third parties the power to enforce policies on users computers against the
users wishes -- they let others pressure you to hand some control over your PC to
someone else. This is a "feature" ready-made for abuse by software authors who want to
anticompetitively choke off rival software.
It needn t be this way: a straightforward change to the plans of trusted computing vendors
could leave the security benefits intact while ensuring that a PC owner s
The ATL OLE DB Provider templates only seem to support read-only rowsets and making them support updating of data isn t as easy as you d expect!
ATL OLE_DB數據庫引擎模板支持只讀的記錄集