-
Building Three-Tier Client/Server Applications with Visual FoxPro
Robert Green
Microsoft Corporation
January 1997
Introduction
Your good friends on the Visual FoxPro™ team at Microsoft spent a great deal of time to make Visual FoxPro a robust and powerful front-end for client/server a..
-
在IIS 網(wǎng)絡(luò)伺候器上運(yùn)行Snort Part I(外文文獻(xiàn)翻譯)
Introduction
Not too long ago when talking about network security tools like Snort or Nmap, those of us in the Windows world were often left on the outside looking in. The problem was that those tools simply were not available for any Window..
-
abira for MDA and UML Developers
Developers of large-scale network-based applications and services use the Kabira infrastructure as a construction and deployment platform for software designed on the OMG Model Driven Architecture (OMG MDA?) and the Unified Modeling Language (UML?):
Let's skip ..
-
ISO 8501-1-2007 涂裝油漆和有關(guān)產(chǎn)品前鋼材預(yù)處理 表面清潔度的目視評定 (中文譯本)
-
基于JSP的BBS論壇管理系統(tǒng)
包括源代碼
目 錄
摘 要 1
關(guān)鍵詞 1
Abstract 1
Keywords 1
前 言 2
1 系統(tǒng)技術(shù)及運(yùn)行環(huán)境 3
1.1 JSP技術(shù)簡介 3
1.2 JAVABEAN技術(shù)簡介 4
1.3 JDBC技術(shù)簡介 4
1.4 TOMCAT技術(shù)簡介 5
1.5運(yùn)行環(huán)境 5
2 需求分析 6
2.1 編寫目的 6
2.2 任務(wù)目標(biāo) 6
2.2.1基本性能 6
2.2.2..
-
目 錄
第一章:緒論 1
1.1 課題背景 1
1.2 工作內(nèi)容及研究成果 1
1.3 論文結(jié)構(gòu) 2
第二章:數(shù)據(jù)倉庫、元數(shù)據(jù)、體系結(jié)構(gòu)理論概述 3
2.1 數(shù)據(jù)倉庫理論概述 3
2.1.1 引言 3
2.1.2 數(shù)據(jù)倉庫的定義及特點(diǎn) 3
2.1.3 數(shù)據(jù)倉庫的數(shù)據(jù)模型 4
2.1.4 數(shù)據(jù)倉庫的建設(shè) 5
2.1.5 數(shù)據(jù)倉庫的應(yīng)用—OLAP 5
2.1..
-
AbstractA fingerprint recognizing system is built with two principal components: the fingerprint administrator and the fingerprint recognizer. Fingerprints are identified by their special features such as ridge endings, ridge bifurcation, short ridges, and ridge enclosures, which are collectively..
-
This is the final article in a three-part series devoted to studying normal traffic. As was explained in Studying Normal Traffic, Part One and Studying Normal Traffic,Part Two: Studying FTP Traffic, we often focus our attention on the characteristics of suspicious packets without first becoming f..
-
Several techniques make graphics smaller without losing image quality. Three prominent designers share their secrets.How do you create Web beautiful pages that download quickly? It's easy if you understand the constraints of Web color management. This article is a synthesis of interviews with thr..