Welcome![Sign In][Sign Up]
Location:
Search - isn

Search list

[Othertreestore

Description: Tree views are capable of storing hierarchical data, which isn t intuitively serialized. The TreeStore sample is an MDI application which shows a view based on CTreeView and demonstrates loading and saving the content of the control with MFC s CArchive-based serialization. The code is also rife with calls to the item navagation routines of CTreeCtrl, including GetNextSiblingItem(), GetPrevSiblingItem(), and GetParentItem().
Platform: | Size: 42049 | Author: 陈伟 | Hits:

[Internet-NetworkSocketAdapter

Description: Library of C functions that allows a program to use WinSock 2 functionality if it is available or fall back to WinSock 1.1 if it isn t.
Platform: | Size: 6933 | Author: 胡永登 | Hits:

[ListView/ListBoxCheckListBoxCBN

Description: like the CCheckListBox class provided with MFC, however, it’s use isn’t obvious and the wizard assistance stops at the CListBox class. I’ll describe how to insert it easily in your project. (There may be easier ways to do it, but this is how I do it and it works). -like the CCheckListBox class provided with MFC, however, it's use is not obvious and the wizard assistance stops at the CListBox class. I'll describe how to insert it easily in your project. (There may be easier ways to do it, but this is how I do it and it works).
Platform: | Size: 13028 | Author: 理理 | Hits:

[Other resourceBetter_Faster_Lighter_Java

Description: This book isn t for uber-programmers who already have all the answers. If you think that J2EE does everything that you need it to do and you can make it sing, this book is not for you. Believe me, there are already enough books out there for you.
Platform: | Size: 774427 | Author: 赵毅 | Hits:

[WinSock-NDISTribeFloodNet2k

Description: Tribe FloodNet 2k Distributed Denial Of Service Network 分布式拒绝服务工具的源代码,下面为英文说明: TFN can be seen as the yet most functional DoS attack tool with the best performance that is now almost impossible to detect. What is my point in releasing this? Let me assure you it isn t to harm people or companies. It is, however, to scare the heck out of everyone who does not care about systematically securing his system, because tools sophisticated as this one are out, currently being improved drastically, kept PRIVATE, and some of them not with the somewhat predictable functionality of Denial Of Service. It is time for everyone to wake up, and realize the worst scenario that could happen to him if he does not care enough about security issues. Therefore, this program is also designed to compile on a maximum number of various operating systems, to show that almost no modern operating system is specifically secure, including Windows, Solaris, most UNIX flavors and Linux. -Tribe FloodNet 2k Distributed Denial Of Se rvice Network Distributed denial of service tools source code for the English below : TFN can be seen as the most functional yet DoS att Ack tool with the best performance that is now al most impossible to detect. What is my point in re this leasing Let me assure you it isn t to harm peo ple or companies. It is, however, to scare the heck out of everyone who does not car e about systematically securing his system, because tools sophisticated as this one are out , currently being improved drastically. PRIVATE kept, and some of them not with the somewhat predictab le functionality of Denial Of Service. It is tim e for everyone to wake up. and realize the worst scenario that could Happe n to him if he does not care enough about security issues. There
Platform: | Size: 44662 | Author: onlyu | Hits:

[Other resourceMFC_Black_Book

Description: MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting things done their way. Me, I’m in the second group. If you are in the same boat (or would like to be) this book is for you. This book won’t teach you MFC—not in the traditional sense. You should pick it up with a good understanding of basic MFC programming and a desire to do things differently. This isn’t a Scribble tutorial (although I will review some fundamentals in the first chapter). You will learn how to wring every drop from your MFC programs. You’ll discover how to use, abuse, and abandon the document/view architecture. If you’ve ever wanted custom archives, you’ll find that, too.-MFC Black Book Introduction : Are you an MFC programmer Good. There are two typ es of MFC programmers. What kind are you The firs t kind are the good programmers who write progra ms that conform to the way MFC wants you to do thin gs. The second bunch are wild-eyed anarchists w ho insist on getting things done their way. Me, I'm in the second group. If you are in the same boa t (or would like to be), this book is for you. This b ook will not teach you MFC-not in the traditional s 810005. You should pick it up with a good understan ding of basic MFC programming and a desire to do t hings differently. This is not a tutor Scribble ial (although I will review some fundamentals i n the first chapter). You will learn how to wring every drop from your MFC programs. You'll disco ver how to
Platform: | Size: 1706696 | Author: Mr .Wang | Hits:

[Button controlMemoryMonitor

Description: MemoryMonitor demonstrates the use of the java.lang.management API in observing the memory usage of all memory pools consumed by the application. This simple demo program queries the memory usage of each memory pool and plots the memory usage history graph. To run the MemoryMonitor demo java -jar <JDK_HOME>/demo/management/MemoryMonitor.jar These instructions assume that this installation s version of the java command is in your path. If it isn t, then you should either specify the complete path to the java command or update your PATH environment variable as described in the installation instructions for the Java 2 SDK.-MemoryMonitor demonstrates the use of the java.lang.management API in observing the mem ory usage of all memory pools consumed by the apppublication. This simple queries the demo program memory usage of each memory pool and plots the memory usage history graph. To run the MemoryMonitor demo java -jar
Platform: | Size: 14803 | Author: 向明建 | Hits:

[Other resourcetempelmeier

Description: 标题为UML is great for Embedded Systems – Isn’t it?,应该是探讨UML是否适用嵌入式系统的吧-heading for UML is great for Embedded Systems-Is' not it should be applied to explore whether UML Embedded System, the happiest
Platform: | Size: 212437 | Author: 陈南京 | Hits:

[Other resourceUnderstanding.the.Linux.Kernel.3rd.Edition

Description: In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn t kept waiting any longer than necessary for the relatively slow disks.-In order to thoroughly understand what mak es Linux tick and why it works so well on a wide var iety of systems, you need to delve deep into the heart of the kerne l. The kernel handles all interactions between the CPU and the external world, and determines which programs will share proce ssor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently. and expertly organizes data transfers so that t he CPU is not kept waiting any longer than necessa ry for the relatively slow disks.
Platform: | Size: 2889481 | Author: 丁绍洁 | Hits:

[mpeg mp3mpg123-0.54.tar

Description: This isn t a new player. It s mainly based on the mpegaudio (FHG-version) package with several additions and optimizations.-This is not a new player. It's mainly based on t he mpegaudio (FHG-version) package with sever al additions and optimizations.
Platform: | Size: 40741 | Author: Tzu-Cheng Huang | Hits:

[OpenGL programwater

Description: Water is a small mini project inspired by a post in my message forum. The post was talking about whether or not it would be possible to create a water effect by modifying the waving flag tutorial. I stripped the flag of it s texture, put stars in the background, set up 3 layers of waving material, and used some simple blending to make it look as though the three layers were waves rippling across the screen. The effect isn t great, but it s cool looking!
Platform: | Size: 53208 | Author: hxw | Hits:

[Other resourcedrcom-client-win32-0.2.2-bin

Description: C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn t just tell you what s wrong with C++, but offers practical techniques and tools for writing code that s more robust, flexible, efficient, and maintainable. He shows you how to tame C++ s complexity, cut through its vast array of paradigms, take back control over your code--and get far better results
Platform: | Size: 53113 | Author: 李志华 | Hits:

[Ftp Serverncftp-3.2.3-src

Description: NCftpd Want filename completion? It s built-in, GNU Readline isn t necessary. Want full-screen support? Install Ncurses if your OS s curses stinks. NcFTP uses \"passive\" by default. Try \"set passive off\" if needed. Yes, it s Y2K compliant. 1. But what is
Platform: | Size: 643440 | Author: hanying | Hits:

[Other resourceVisualC++WindowsShellProgramming

Description: Visual C++ Windows Shell Programming Welcome to Visual C++ Windows Shell Programming! With this book, you ll learn how to program the Windows Shell, customize its behavior and integrate your applications with it. You ll discover how to use and modify its features to best effect, and the way to call shell API functions whose documentation is scant. Programming the shell isn t difficult, but few books explain the subject in its entirety.
Platform: | Size: 5052754 | Author: 熊欢 | Hits:

[WinSock-NDISVB-Automatically_Establish_DialUp_RAS_Connections.

Description: Title: Automatically Establish Dial-Up/RAS Connections Description: Auto Connect Software is very small application to auto connect to your RAS or VPN services. For each connection, it checks to see if the connection is established, and if it isn t, it attempts to make a connection. It can work as a form or tray icon for using less memory. This file came from Planet-Source-Code.com...the home millions of lines of source code You can view comments on this code/and or vote on it at: http://www.Planet-Source-Code.com/vb/scripts/ShowCode.asp?txtCodeId=4833&lngWId=1 The author may have retained certain copyrights to this code...please observe their request and the law by reviewing all copyright conditions at the above URL.
Platform: | Size: 7263 | Author: sylvester | Hits:

[Windows DevelopCenterMDIWnd_demo

Description: Have you ever wondered how to get the MDI Child Frame windows in your MDI application to appear centered in the client area of the main frame window? Have you tried using CenterWindow(), but found that the window still isn t centered properly? This article shows you how, and we also talk about the ways of keeping child windows centered, even if the user moves or resizes the main window, or shows or hides the toolbar(s) and status bar.
Platform: | Size: 39960 | Author: 吴清 | Hits:

[Other resourcePicoDrive030_source

Description: 一个PocketPC平台MD游戏模拟器picodrive的源代码. Make sure you have Microsoft Visual C++ installed (I use 6.0 myself). Make sure you have Embedded Visual C++ 3.0 installed (4.0 isn t too great). Find ARMASM.EXE and copy it to the \"Cyclone\" directory (or put it on path). Open Cyclone.dsw in Visual C++ and compile and run (Ctrl-F5). Cyclone.obj should have been created and assembled Open PicoDrive.vcw in Embedded Visual C++ and compile.
Platform: | Size: 315958 | Author: 晓龙 | Hits:

[Other resourcehash

Description: /* * The internal form of a hash table. * * The table is an array indexed by the hash of the key collisions * are resolved by hanging a linked list of hash entries off each * element of the array. Although this is a really simple design it * isn t too bad given that pools have a low allocation overhead. */ split from apache for general usage
Platform: | Size: 7680 | Author: llr | Hits:

[Other resourceAJAXInAction

Description: Ajax is indisputably hot, it isn’t really new. It isn’t really a technology,
Platform: | Size: 6631167 | Author: john | Hits:

[MultiLanguageISN

Description: 常见的中文内码一般有GB2312,GBK和台湾那边用的BIG5,有时候看一些台湾编程里的资料,都是乱码-the exchage of the ISN
Platform: | Size: 1024 | Author: 周阳 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 14 »

CodeBus www.codebus.net