current location:Home > 安全�%8 search

Classify:
Found a total of 21313 related content
  • PHP Security Basics (Chinese version)
    PHP Security Basics (Chinese version)
    PHP Security Basics (Chinese version)
    2018-02-10 332 2867875
  • Network Security Basics Tutorial
    Network Security Basics Tutorial
    Network Security Basics Tutorial
    2018-01-22 222 2943468
  • "Complete Mastery of HTML Dreamweaver 8 Web Page Production Technology". (Qin Peng)
    "Complete Mastery of HTML Dreamweaver 8 Web Page Production Technology". (Qin Peng)
    "Complete Mastery of HTML Dreamweaver 8 Web Page Production Technology". (Qin Peng)
    2017-10-26 463 3257416
  • PHP+MySQL commercial website construction practice
    PHP+MySQL commercial website construction practice
    Chapter 1 Getting Started with Linux 1-1 Characteristics of operating systems 1-2 Installation settings 1-2-1 hard disk partition 1-2-2 Set LILO 1-2-3 Network address and time zone settings l-2-4 Set the account passwords of system administrators and general users 1-2-5 system safety certification l-2-6 Select the installation kit 1-2-7 Set up the display card and test Xwindows l-2-8 Start installing the kit l-3 Common commands l-4 basic network settings
    2017-12-11 349 3103499
  • Programming and examples of PHP4
    Programming and examples of PHP4
    Preface Part One: Getting Started Chapter 1 Introduction to PHP Chapter 2 PHP4 installation, testing and configuration Chapter 3 Quick Start with PHP Part 2 Applications Chapter 6 I/O Operation Application Chapter 7 Computing Applications Chapter 8 Image Application Part Three: Practical Combat Chapter 13: A huge crowd - Web page counter design Chapter 14 Don’t complain – Message board design Chapter 15 Who is it - website information query design Part 4 Supplement
    2017-12-08 293 3111689
  • Android security and permissions WORD version
    Android security and permissions WORD version
    This document mainly talks about the security and permissions of Android; Android is a multi-process system, and each application (and system component) runs in its own process. I hope this document will help friends in need; interested friends can come and take a look.
    2024-01-28 2 1925
  • hive function encyclopedia Chinese WORD version
    hive function encyclopedia Chinese WORD version
    This document describes the hive function in detail; it is relatively comprehensive and I hope it will be helpful to everyone's study; interested friends can come and take a look at the catalog 1. Relational operations: 4 1. Comparison of equal values: = 4 2. Comparison of unequal values : 4 3. Less than comparison: < 4 4. Less than or equal to comparison: 5 6. Greater than or equal to comparison: >= 5 7. NULL value judgment: IS NULL 5 8. Non-null value judgment: IS NOT NULL 6 9. LIKE comparison: LIKE 6 10.J
    2024-01-29 0 1138
  • Hive permission control Chinese WORD version
    Hive permission control Chinese WORD version
    Hive can control permissions through metadata from version 0.10 (including version 0.10) onwards. In versions before Hive-0.10, permissions are mainly controlled through Linux users and user groups. CREATE, SELECT, and DROP of Hive tables cannot be controlled. Of course, Hive's control of permissions based on metadata is not completely safe. The purpose is to prevent users from accidentally doing operations they shouldn't do. Interested friends can come and take a look
    2024-02-03 0 1432
  • Android Development Guide Chinese PDF version
    Android Development Guide Chinese PDF version
    Android development guide Chinese pdf version, friends who learn android can refer to it. Application Fundamentals Key Classes Application Components Activation Components: Intent Close Component Manifest File Intent Filter Activity and Task Affinity (Attraction) and New Task Loading Mode Clean Stack Start Task Process and Thread Process Thread Remote Procedure Call Thread Safe Method Component Life cycleActivi
    2024-02-26 0 614
  • ANDROID Bluetooth programming WORD document doc format
    ANDROID Bluetooth programming WORD document doc format
    Using the BluetoothAdapter class, you can find surrounding Bluetooth devices on your Android device and then pair (bind) them. Bluetooth communication is transmitted to each other based on the unique address MAC. Considering security issues, Bluetooth communication needs to be paired first. Then start to connect to each other. After the connection, the devices will share the same RFCOMM channel to transmit data to each other. Currently, these implementations are implemented on Android 2.0 or higher SDK. 1. Finding/discovering dev
    2024-02-27 0 977