Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison Wesley Longman Inc., was aware of a trademark claim, the designations have been printed in initial caps or all caps. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers discounts on this book when ordered in quantity for special sales. For more information, please contact:
標(biāo)簽: manufacturers designations distinguish products
上傳時間: 2017-01-23
上傳用戶:woshiayin
Optional time to see their dog timer, with protection
標(biāo)簽: protection Optional their timer
上傳時間: 2017-02-11
上傳用戶:515414293
Stem Proter algorithm to convert words to their stem form
標(biāo)簽: algorithm convert Proter their
上傳時間: 2017-03-09
上傳用戶:aig85
ATM on the principle, details of their development and application of principles! Documents in PDF format!
標(biāo)簽: application development principles Documents
上傳時間: 2014-01-04
上傳用戶:star_in_rain
RFID, the wireless technology that has helped millions of people around the world to protect their property and make their workplaces safer is now in danger of being viewed as a security risk. Ray Stanton examines the love-hate relationship between people and Radio Frequency Identification [RFID] tags and highlights the need for informed debate about the privacy issues the technology raises.
標(biāo)簽: technology the millions wireless
上傳時間: 2017-03-19
上傳用戶:cmc_68289287
This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.
標(biāo)簽: application architects interested building
上傳時間: 2014-01-24
上傳用戶:xwd2010
Do you as a programmer for their own software to be illegal to crack the use of distress, this is a hot issue programmers abroad, I believe you made reference to this source will be a number of anti-cracking tools.
標(biāo)簽: programmer distress software illegal
上傳時間: 2014-12-21
上傳用戶:李夢晗
this version is only interesting for people that want to generate their own levels (need JDK to compile new level).
標(biāo)簽: interesting generate version levels
上傳時間: 2017-06-02
上傳用戶:tb_6877751
WALSH CODES AND their DERIVATIVES - INTRODUCTION - WALSH FUNCTIONS DEFINITION AND PROPERTIES - WALSH FUNCTION GENERATING - WALSH FUNCTIONS USED WITHIN THE IS-95 SYSTEM - WALSH FUNCTIONS USED WITHIN THE CDMA2000 SYSTEM
標(biāo)簽: WALSH INTRODUCTION DERIVATIVES DEFINITION
上傳時間: 2017-06-05
上傳用戶:天誠24
WALSH CODES AND their PSEUDOALEATORY SEQUENCES - INTRODUCTION - THE REPRESENTATION AS ELEMENTS OF THE EXTENS GALOIS FIELDS - THE PSEUDORANDOM SEQUNCE GENERATORS MPLEMENTATION - MAXIMAL SEQUENCE (M-SEQUENCES) - GOLD CODES - KASAMI CODES - EXAMPLES OF PSEUNDOALEATOR SEQUNECES USED IN IS-95
標(biāo)簽: PSEUDOALEATORY REPRESENTATION INTRODUCTION SEQUENCES
上傳時間: 2017-06-05
上傳用戶:JIUSHICHEN
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1