Welcome![Sign In][Sign Up]
Location:
Search - exposed

Search list

[Other resourcecqa0408

Description: 代码包含以下一个示范例子: 1、GetKeyState 使用示例 2、STL 字符串类与 UNICODE 3、如何向C#或.NET框架暴露 C++ 对象? 4、如何获取专用文件夹的路径名? 巧。-code contains a model following examples : 1, 2 GetKeyState use examples, and the STL string UNICODE three categories, how to C# or.NET framework exposed C object? 4, how to obtain special folder paths? Qiao.
Platform: | Size: 195422 | Author: 刘斌 | Hits:

[Other resourcemobuffer

Description: 初学mo的人应该看看,尤其是刚刚接触到buffer的人,很重要的-Beginners should look at the people, especially just exposed to the buffer, a very important
Platform: | Size: 3022 | Author: liu5 | Hits:

[Dialog_Windowgrlcm025

Description: 一个很全面的LCM显示的源程序,有详细说明 用TC++1.01弓编译通过。多多批教。-a very comprehensive LCM display of the source, is described in detail with TC + +1.01 for leaves exposed arch compile. The approved lot.
Platform: | Size: 1713651 | Author: 赵卫东 | Hits:

[ELanguagehc_compiler

Description: 由于时间紧迫及事先准备不足,编译器最后定型时暴露出不少问题及不足之处,主要有以下一些方面:   不支持数组数据类型,这是文法分析器设计时的一个疏漏,由于时间关系,最后只得把扫描器中已做好的相关的数组部分删去。   对于float数据类型的支持,直到语义分析都是正常的,也能生成相应的汇编代码,但由于我们对8086/8088指令系统本身了解不足,这样的汇编代码将只能做到含义上完全忠实于源程序,但不能运行。   对于局部变量的支持,则于时间紧迫,所有的局部变量全被处理成静态变量。使递归函数不能得到正确的结果。    对于函数调用语句,不进行参数匹配检查,如果参数数量不对,也将能通过编译,但运行时将产生非法操作。   对&& !等逻辑操作在最后生成代码时处理比较粗燥,生成的代码在逻辑复杂时将不能保证运行正常。   接下来有一些,不能说是缺陷,但必须说明的问题:   对于main函数,没有参数表,通回类型也必须为void,但如果写上参数表及其他返回类型也能编译通过,生成代码时将简单地忽略,不影响最后的代码的运行。   对于while,for,if语句,其语句体不管是一句还是多句,必须都有{}围起来。这跟C语言中若是一句则可省略{}不同。-Due to the time constraints and lack of preparation in advance, the compiler finalized when exposed numerous problems and shortcomings, mainly in the following aspects : no support for array data type, which is grammar analyzer design of an omission, because of the time, the final could only have scanners do phase customs array deleted. For float data types of support until semantic analysis is normal, and can generate the corresponding assembly code, but because of our 8086/8088 directive to the knowledge of the system itself, this compilation can do to code meaning entirely faithful to the source, but not running. For the support of local variables, in the time constraints, all local variables were all handled in the static variable. So recursive function will not get the right results.
Platform: | Size: 260096 | Author: 周杰 | Hits:

[Video CaptureDirectXCaptureClassLibrary

Description: This article presents a class library for capturing audio and video to AVI files in .NET. Some of the features of this library: List and select hardware devices Access to common audio and video settings (e.g. frame rate, size) Supports audio and video compression codecs Supports video preview Supports TV tuners Supports crossbars and audio mixers Retrieve device capabilities Show property pages exposed by drivers MSDN-style documentation included 这是一个.NET类库,用于捕获音频和视频数据到avi文件中。-This article presents a class library for capturing audio and video to AVI files in. NET. Some of the features of this library: List and select hardware devices Access to common audio and video settings (eg frame rate, size) Supports audio and video compression codecs Supports video preview Supports TV tuners Supports crossbars and audio mixers Retrieve device capabilities Show property pages exposed by drivers MSDN-style documentation included This is a. NET class library for capturing audio and video data to avi file.
Platform: | Size: 433152 | Author: 成东 | Hits:

[BooksProgramminginterviewsexposed

Description: Programming interviews exposed 程序员面试宝典 本书取材于各大IT公司历年面试真题(包括笔试题、口试题、电话面试、英语面试,以及逻辑测试和智商测试)。通过精确详细的分类,把在应聘程序员(含网络、测试等)过程中所遇见的常见考点分为21章。不仅对传统的C系语言考点做了详尽的解说,包括面向对象问题、sizeof问题、const问题、数据结构问题等。还根据外企出题最新特点,针对设计模式问题、C#问题、网络问题、数据库问题、NET问题等,做了深入的说明。 程序员面试宝典 英文版 Programming interviews exposed -Programming interviews exposed interview programmers Baodian book based on interviews over the years in major IT companies真题(including the pen test, I test, telephone interviews, interviews in English, as well as the logic test and IQ test). Through the precise and detailed classification of programmers in the candidates (including the network, testing, etc.) encountered during the common test is divided into 21 chapters. Not only to the traditional C language test department has done a detailed explanation, including object-oriented issues, sizeof problems, const problem, data structure and so on. Also the latest questions in accordance with the characteristics of enterprises, in view of the design model, C# Problems, network problems, database problems, NET, etc., to do an in-depth description. The English version of the interview programmers Baodian Programming interviews exposed
Platform: | Size: 1800192 | Author: wu | Hits:

[Software EngineeringWrox.Programming.Interviews.Exposed.2nd.Edition.Ap

Description: Wrox.Programming.Interviews.Exposed.2nd.Edition 这个是全英文的第二版,chm版本, 本书取材于各大IT公司历年面试真题(包括笔试题、口试题、电话面试、英语面试,以及逻辑测试和智商测试)。通过精确详细的分类,把在应聘程序员(含网络、测试等)过程中所遇见的常见考点分为21章。不仅对传统的C系语言考点做了详尽的解说,包括面向对象问题、sizeof问题、const问题、数据结构问题等。还根据外企出题最新特点,针对设计模式问题、C#问题、网络问题、数据库问题、NET问题等,做了深入的说明。-Wrox.Programming.Interviews.Exposed.2nd.Edition this is the second edition in English, chm version of the book based on interviews over the years in major IT companies真题(including the pen test, I test, telephone interviews, interviews in English, as well as logic tests and IQ tests). Through the precise and detailed classification of programmers in the candidates (including the network, testing, etc.) encountered during the common test is divided into 21 chapters. Not only to the traditional C language test department has done a detailed explanation, including object-oriented issues, sizeof problems, const problem, data structure and so on. Also the latest questions in accordance with the characteristics of enterprises, in view of the design model, C# Problems, network problems, database problems, NET, etc., to do an in-depth description.
Platform: | Size: 1910784 | Author: zmsx | Hits:

[OtherMcGraw.Hill.Osborne.Media.Hacking.Exposed.Sixth.E

Description: The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.
Platform: | Size: 9222144 | Author: holahola | Hits:

[OtherMcGraw.Hill-HackingExposedWebApplications

Description: McGraw Hill Hacking Exposed Web Applications
Platform: | Size: 4241408 | Author: games182 | Hits:

[OtherProgramming_Interviews_Exposed

Description: Programming Interviews Exposed: Secrets to Landing Your Next Job, Second Edition byJohn Mongan, Noah SuojanenandEric Gigure
Platform: | Size: 1914880 | Author: 齐青超 | Hits:

[OtherHacking_Exposed_NSSS_6th_E_2009

Description: Hacking Exposed, Network Security Secrets & Solutions 6th Edition (2009) eBook
Platform: | Size: 9179136 | Author: Alexander | Hits:

[Windows Developprogramming-interviews-exposed

Description: this is a book on programming interviews which is a must read!
Platform: | Size: 3365888 | Author: project | Hits:

[OtherHacking.Exposed.6Th.Ed

Description: 黑客大曝光 :网络安全机密与解决方案书籍的 第六版 -HACKING Exposed 6: NETWORK SECURITY SECRETS&SOLUTIONS
Platform: | Size: 8121344 | Author: Irene | Hits:

[Delphi VCLDelphi-Graphics-and-Game-Programming-Exposed-with

Description: Delphi Graphics and Game Programming Exposed with DirectX 7.0 by John Ayres Wordware Publishing, Inc.
Platform: | Size: 2157568 | Author: Hikum1207 | Hits:

[OS programHacking.Exposed.6Th.Ed

Description: 第1部分 收集情报 第1章 踩点 第2章 扫描 第3章 查点 第2部分 系统攻击 第4章 攻击Windows 第5章 攻击Unix 第3部分 基础设施攻击 第6章 远程连接和VoIP攻击 第7章 网络设备攻击 第8章 无线攻击 第9章 硬件攻击 第4部分 应用程序和数据攻击 第10章 攻击应用代码 第11章 Web攻击 第12章 攻击因特网用户 第5部分 附录 附录A 端口 附录B 最有威胁的14个安全漏洞 附录C 拒绝服务(DOS)与分布式拒绝服务(DDOS)攻击-Part 1 of intelligence gathering 1 Zhang Capitol, Chapter 2 scan The first three chapters enumeration Part 2 of system attacks Chapter 4, to attack Windows Chapter 5 attack Unix Part 3 infrastructure attacks Chapter 6, remote access and VoIP attacks Chapter 7 network equipment attacks Chapter 8 of wireless attacks Chapter 9 hardware attacks Part 4 of the application and data attacks Chapter 10 to attack the application code Chapter 11 Web attacks Chapter 12 attack Internet users Part 5 Appendix Appendix A port Appendix B there is a threat to the 14 security vulnerabilities Appendix C to denial of service (DOS) and Distributed Denial of Service (DDOS) attack
Platform: | Size: 8120320 | Author: 李玉 | Hits:

[Software EngineeringHacking.Exposed.6Th.Ed

Description: 计算机安全 《黑客大曝光:网络安全机密与解决方案(第6版)》是全球销量第一的计算机信息安全图书,被信息安全界奉为圣经。作者独创“黑客大曝光方法学”,从攻防两方面系统阐述了最常见的黑客入侵手段及对应的防御策略-Computer security, " Hacking Exposed: Network Security Secrets and Solutions (6th Edition)" is the first global sales of computer information security books, regarded as the Bible, the information security community. Of the original " Hacking Exposed methodology, described the most common means of hacking and defense strategy from both attack and defense system
Platform: | Size: 8121344 | Author: renjiawei | Hits:

[Internet-NetworkHacking.Exposed.6Th.Ed

Description: Hacking Exposed 英文原版,很经典的网络攻防教程 -Hacking Exposed English original, very classic network attack and defense tutorial
Platform: | Size: 9334784 | Author: mengyun | Hits:

[OtherProgramming-Interviews-Exposed-2nd-Ed

Description: The book "Programming Interviews Exposed 2nd Ed" will help in setting the correct altitude of a software professional for cracking jobs interviews at top companies.
Platform: | Size: 1107968 | Author: Gaurav Chaudhry | Hits:

[Internet-Networkexposed

Description: simulate exposed terminal problem with ns2
Platform: | Size: 548864 | Author: mr.serious | Hits:

[OtherHacking Exposed Mobile.pdf

Description: Hacking Exposed Mobile Hacking
Platform: | Size: 4976640 | Author: white_bob | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net