This book presents an insightful view of XML that places this emerging technology in the context of the ongoing Web revolution. Written for business and technical professionals, this book revals the true value of XML for distributed information systems. It explains how XML is transforming the way organizations manage data and build software systems details the opportunities the language offers for organizatoins that understand tis significance and potential impact and explains how XML and Web services reflect a fundamental shift in software construction-from monolithic applications to software based on the composition of simple parts.
標簽: insightful technology presents emerging
上傳時間: 2015-09-24
上傳用戶:思琦琦
JVT-T206 contains the reference software of the Joint 4:4:4 Verification Model (JFVM) 4 in the directory JVT-T206_jfvm_1_11 as described in JVT-T205
標簽: the Verification reference contains
上傳時間: 2015-09-24
上傳用戶:TF2015
This is a boiler test system,has been use in factory
標簽: factory boiler system This
上傳時間: 2015-09-24
上傳用戶:許小華
struts-in-action是中基于MVC模式開發(fā)的好思路
標簽: struts-in-action MVC 模式
上傳時間: 2013-12-26
上傳用戶:牛津鞋
an external program called from Adam s FitnessFunction class in order to evaluate the fitness of a genome within a distributed grid.
標簽: FitnessFunction external evaluate program
上傳時間: 2015-09-25
上傳用戶:pompey
AT89S8252, AT89S53 SPI Program, This program shows how to configure and use the SPI in master mode for the following microcontrollers: ATMEL AT89S53 ATMEL AT89S8252
標簽: SPI configure Program program
上傳時間: 2015-09-26
上傳用戶:xlcky
Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports: * Main features of SSH 2 protocol * Implements X11 forwarding, and authentication-agent forwarding for OpenSSH clients * Compatible with OpenSSH ~/.ssh/authorized_keys public key authentication
標簽: environments Dropbear designed supports
上傳時間: 2014-01-16
上傳用戶:skhlm
About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.
標簽: WepDecrypt Wepdecrypt Wireless guesses
上傳時間: 2013-12-25
上傳用戶:6546544
Subcarrier Allocation in a Multiuser MIMO Channel Using Linear Programming
標簽: Programming Subcarrier Allocation Multiuser
上傳時間: 2013-12-17
上傳用戶:yzhl1988
Introduces synchronization concepts and practices in multithreaded applications
標簽: synchronization multithreaded applications Introduces
上傳時間: 2013-12-15
上傳用戶:sevenbestfei
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1