Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services f
DE2 web serve的源代码 Overview: - This design is based on the Nios II/f core and provides a typical mix of peripherals and memories as well as a video pipeline. The SOPC Builder system provides an interface to each hardware component on the embedded eva
hsqldb-2.0.0源文件。 This distribution is version RC_8 and therefore not recommended for production. It is released only to allow our users learn the new features, test it, and report any bugs or questions to http://hsqldb.org/support . Please read the
Windows Server 2008 R2 Unleashed is the most comprehensive and realistic guide to planning, design, prototyping, implementation, migration, administration, and support. Based on the authors’ unsurpassed experience working with Windows Server 2008 R2
用VC实现屏幕保护程序 ======================================================================== MICROSOFT FOUNDATION CLASS LIBRARY : B14 ======================================================================== AppWizard has created this B14 application for you
DelphiBufferListExpert 1. Close Delphi. 2. Copy the dclsmpedit50.bpl file into the Delphi\Bin directory. 3. Open Delphi. 4. Open any project. 5. Go to the editor and click Ctrl+B .
Part I: Introduction to Windows Administrative scr ipting Chapter 1. scr ipting Concepts and Terminology What Is scr ipting? scr ipt Hosts ActiveX scr ipting Languages The Component Object Model ( COM ) Critical scr ipting Security Issues Review Cha
The IBIS to SPICE application generates SPICE models from IBIS (I/O Buffer Information Specification) data sheets. It reads a template file to define the SPICE models to be generate. The template file is named template.mdl and must be in the same di
活动目录权利管理服务(AD RMS-Windows Server Active Directory Rights Management Services)是一种信息保护技术,与AD RMS激活的应用一起保障数字信息不受未授权的使用。内容拥有者可以确切定义接收者如何使用这些信息,如谁可以打开、修改、打印、转发或使用邮件或文件进行其他活动。公司可以创建自定义使用权利模版,如只可以直接用于如财务报告、产品说明、顾客数据以及电子邮件信息等信息的”机密-只读”模版。