Comprehensive reference for experienced Windows programmers. Power techniques for developing Windows applications. Maximizes the performance of C and Microsoft's SDK. Includes full-featured reference and documentation on Windows functions and messages.
USING WILD CARDS WITH RENAME You can use the ? and * wild - card symbols to rename a group of files but these symbols must be used with care . The wild - card symbols can be safely used in identical positions in both file names to ...
Explains the features of Microsoft Windows 95, with step-by-step instructions to getting started, customizing, using programs, multitasking, organizing files, and discovering the Internet and multimedia.
Using Linux: Understanding Linux
操作系统的安全性在计算机信息系统的整体安全性中具有至关重要的作用,没有操作系统提供的安全性,计算机系统的安全性是没有基础的。本书全面介绍了操作系统安全的基本理论 ...
Mackinnon, Tim, Steve Freeman, and Philip Craig. 2000. “Endo-Testing: Unit Testing with Mock Objects,” eXtreme Programming and Flexible Processes Software Engineering-XP2000 Conference. Maguire, Steve. 1993. Writing Solid Code.
This applied book for engineers and scientists, written in a non-theoretical manner, focuses on underlying principles that are important in a wide range of disciplines. It emphasizes...
The Book of GENESIS - Exploring Realistic Neural Models with the GEneral NEural SImulation System is the first publication to thoroughly and accurately describe how to use the "GENESIS" simulation/modeling...
Coverage of business database systems is organized around the database development life cycle in this text, providing a basis for discussing conceptual and implementation design, database implementation, and the management...
This text aims to provide a firm foundation in the principles and concepts of operating systems design and discuss major issues, as well as to show how several operating systems...
Hardware, software, firmware; Process concepts; Asynchronous concurrent processes; Concurrent programming: monitors; the ada rendezvous; Deadlock; Storage management; Real storage; Processor management; Auxiliary storage management; Performance; Network and security; Case studies.