自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

Newweapon's Trace

Try my best and smile every day!

  • 博客(9)
  • 资源 (13)
  • 收藏
  • 关注

原创 用Delphi写一个超级简单的(wav, mp3)播放器

    使用Delphi中System中的MediaPlayer控件。    因为我主要是需要使用播放声频文件中的片断,比如 21000ms ~35000ms。在Delphi中可以使用MediaPlayer的StartPos和EndPos来实现。    在编程过程中主要遇到的问题是:当播放wav格式时,利用设置StartPos和EndPos可以播放任意位置的片断,但是当播放mp3时,StartPo

2008-04-21 20:34:00 2461

转载 Thread的wait sleep join yield suspend notify区别

注意:这篇文章来自互联网,http://makefire.j2meworld.com/pmis/wdbread.php?forumid=6&filename=f_128,且其中内容有部分错误,比如连续两次start同一个线程,这是会抛出IllegalStateException的。还有最后一段,java2推荐使

2008-04-19 22:56:00 858

转载 Tomcat中用web.xml控制Web应用详解

From:http://blog.csdn.net/feng_sundy/archive/2006/04/24/675320.aspx1 定义头和根元素部署描述符文件就像所有XML文件一样,必须以一个XML头开始。这个头声明可以使用的XML版本并给出文件的字符编码。DOCYTPE声明必须立即出现在此头之后。这个声明告诉服务器适用的servlet规范的版本(如2.2或2.3)并指定管理此

2008-04-14 17:16:00 778 2

转载 持续集成 - Continuous Integration

From: http://www.martinfowler.com/articles/continuousIntegration.html Martin Fowler Continuous Integration is a software development practice where members of a team integrate their work freq

2008-04-14 15:34:00 866

原创 应对不明确的项目需求

今天在Javaeye上看到一个抱怨客户的无底洞需求时,一个网友的回复,觉得不错,对以后自己接项目做个警示:From: http://www.javaeye.com/topic/180477==========================问题========================== 越来越像无底洞的需求 首先声明俺们是做项目的,每个项目

2008-04-13 22:06:00 2598

原创 Spring+Hibernate出错: could not initialize proxy - the owning Session was closed

我的配置是struts2 + hibernate + spring:以下错误解决方案参考了http://blog.csdn.net/lddongyu/archive/2007/08/08/1731521.aspx ,在此表示感谢。分析原因:由于Spring控制的Hibernate的生命周期只针对数据层和服务层,而未管理到表现层,所以会出现the owning Session was c

2008-04-12 22:07:00 597

原创 spring+hibernate事务处理

Spring包含Hibernate事务的配置文件applicationContext.xml如下:xml version="1.0" encoding="UTF-8"?>beans xmlns="http://www.springframework.org/schema/beans"    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance

2008-04-12 21:55:00 764

转载 十个习惯让你精通新的开发技术

十个习惯让你精通新的开发技术

2008-04-12 18:46:00 413

转载 使用 AppFuse 的七个理由

From: http://www.ibm.com/developerworks/cn/java/j-appfuse/index.html 学习 Java 开放源码工具 —— 并使用这些工具提高生产效率

2008-04-11 21:26:00 486

演进式架构英文原版第二版

新鲜出炉的演进式架构 第二版,英文原版。 《Building Evolutionary Architectures —— Automated Software Governance》 2ND EDITION。 作者:Neal Ford, Rebecca Parsons, Patrick Kua, and Pramod Sadalage。

2024-01-13

Appium最新版国内下载安装和使用

Appium最新版国内下载地址,并附文档说明如何安装和使用,并有Java代码片段。如有问题,可给我留言邮件。

2018-01-14

Anaconda3-5.0.1-Windows-x86_64

最新版Anaconda Windows 64安装包:Anaconda3-5.0.1-Windows-x86_64。不要要积分,确发现最低值是2,分,没有0分这个选项……

2017-12-13

Android编程权威指南原版全部36章

Android编程权威指南的全部36章英文原版。MVC,Fragment,Service等各种概念,清清楚楚、明明白白。Android开发中的Java编程思想! 附带源码下载地址:http://download.csdn.net/detail/newweapon/8136629 本书根据美国大名鼎鼎的Big Nerd Ranch训练营的Android培训讲义编写而成,已经为微软、谷歌、Facebook等行业巨头培养了众多专业人才。作者巧妙地把Android开发所需的庞杂知识、行业实践、编程规范等融入一本书中,通过精心编排的应用示例、循序渐进的内容组织,以及循循善诱的语言,深入地讲解了Android开发的方方面面。如果学完一章之后仍然意犹未尽,那“挑战练习”一定会让你大呼过瘾。本书之所以能在移动应用开发类图书中脱颖而出,还在于它真的是在与读者“对话”。阅读本书就好像有一位私人导师在你身边随时为你答疑解惑。

2014-11-08

Android编程权威指南全部36章源代码

Android编程权威指南的全部36章源代码。MVC,Fragment,Service等各种概念,清清楚楚、明明白白。Android开发中的Java编程思想!源代码中有许多值得参考、学习、模仿甚至可以直接利用的价值。 本书根据美国大名鼎鼎的Big Nerd Ranch训练营的Android培训讲义编写而成,已经为微软、谷歌、Facebook等行业巨头培养了众多专业人才。作者巧妙地把Android开发所需的庞杂知识、行业实践、编程规范等融入一本书中,通过精心编排的应用示例、循序渐进的内容组织,以及循循善诱的语言,深入地讲解了Android开发的方方面面。如果学完一章之后仍然意犹未尽,那“挑战练习”一定会让你大呼过瘾。本书之所以能在移动应用开发类图书中脱颖而出,还在于它真的是在与读者“对话”。阅读本书就好像有一位私人导师在你身边随时为你答疑解惑。

2014-11-08

Tomcat运行内幕-How Tomcat Works

本书讲述一般Java Web server以及Tomcat的运行原理,对JavaEE编程有极大的好处。<br>可惜只有前6章。

2008-04-17

Java并发编程实践[英文版] - Java Concurrency In Practice

Java并发编程的经典书籍

2008-04-16

Manning - Java 3D Programming - Source Code(源码)

Manning - Java 3D Programming - Source Code(源码)

2008-02-21

Java 3d Tutorial

Java 3d Tutorial

2008-02-20

A compact reference for 3d computer graphics programming

A compact reference for 3d computer graphics programming

2008-02-20

人工智能-现代方法 Artificial Intelligence A Modern Approach

人工智能-现代方法,Artificial Intelligence A Modern Approach,第一版。<br>经典的人工智能学习书籍 。

2008-01-31

BSD HACKS -- 100个业界最尖端的技巧和工具

Credits<br> About the Author<br> Contributors<br> Acknowledgments<br> Preface<br> Why BSD Hacks?<br> How to Use this Book<br> How This Book Is Organized<br> Conventions Used in This Book<br> Using Code Examples<br> We'd Like to Hear from You<br> Chapter 1. Customizing the User Environment<br> Section 0. Introduction<br> Section 1. Get the Most Out of the Default Shell<br> Section 2. Useful tcsh Shell Configuration File Options<br> Section 3. Create Shell Bindings<br> Section 4. Use Terminal and X Bindings<br> Section 5. Use the Mouse at a Terminal<br> Section 6. Get Your Daily Dose of Trivia<br> Section 7. Lock the Screen<br> Section 8. Create a Trash Directory<br> Section 9. Customize User Configurations<br> Section 10. Maintain Your Environment on Multiple Systems<br> Section 11. Use an Interactive Shell<br> Section 12. Use Multiple Screens on One Terminal<br> Chapter 2. Dealing with Files and Filesystems<br> Section 12. Introduction<br> Section 13. Find Things<br> Section 14. Get the Most Out of grep<br> Section 15. Manipulate Files with sed<br> Section 16. Format Text at the Command Line<br> Section 17. Delimiter Dilemma<br> Section 18. DOS Floppy Manipulation<br> Section 19. Access Windows Shares Without a Server<br> Section 20. Deal with Disk Hogs<br> Section 21. Manage Temporary Files and Swap Space<br> Section 22. Recreate a Directory Structure Using mtree<br> Section 23. Ghosting Systems<br> Chapter 3. The Boot and Login Environments<br> Introduction<br> Section 24. Customize the Default Boot Menu<br> Section 25. Protect the Boot Process<br> Section 26. Run a Headless System<br> Section 27. Log a Headless Server Remotely<br> Section 28. Remove the Terminal Login Banner<br> Section 29. Protecting Passwords With Blowfish Hashes<br> Section 30. Monitor Password Policy Compliance<br> Section 31. Create an Effective, Reusable Password Policy<br> Section 32. Automate Memorable Password Generation<br> Section 33. Use One Time Passwords<br> Section 34. Restrict Logins<br> Chapter 4. Backing Up<br> Introduction<br> Section 35. Back Up FreeBSD with SMBFS<br> Section 36. Create Portable POSIX Archives<br> Section 37. Interactive Copy<br> Section 38. Secure Backups Over a Network<br> Section 39. Automate Remote Backups<br> Section 40. Automate Data Dumps for PostgreSQL Databases<br> Section 41. Perform Client-Server Cross-Platform Backups with Bacula<br> Chapter 5. Networking Hacks<br> Introduction<br> Section 42. See Console Messages Over a Remote Login<br> Section 43. Spoof a MAC Address<br> Section 44. Use Multiple Wireless NIC Configurations<br> Section 45. Survive Catastrophic Internet Loss<br> Section 46. Humanize tcpdump Output<br> Section 47. Understand DNS Records and Tools<br> Section 48. Send and Receive Email Without a Mail Client<br> Section 49. Why Do I Need sendmail?<br> Section 50. Hold Email for Later Delivery<br> Section 51. Get the Most Out of FTP<br> Section 52. Distributed Command Execution<br> Section 53. Interactive Remote Administration<br> Chapter 6. Securing the System<br> Introduction<br> Section 54. Strip the Kernel<br> Section 55. FreeBSD Access Control Lists<br> Section 56. Protect Files with Flags<br> Section 57. Tighten Security with Mandatory Access Control<br> Section 58. Use mtree as a Built-in Tripwire<br> Section 59. Intrusion Detection with Snort, ACID, MySQL, and FreeBSD<br> Section 60. Encrypt Your Hard Disk<br> Section 61. Sudo Gotchas<br> Section 62. sudoscript<br> Section 63. Restrict an SSH server<br> Section 64. Script IP Filter Rulesets<br> Section 65. Secure a Wireless Network Using PF<br> Section 66. Automatically Generate Firewall Rules<br> Section 67. Automate Security Patches<br> Section 68. Scan a Network of Windows Computers for Viruses<br> Chapter 7. Going Beyond the Basics<br> Introduction<br> Section 69. Tune FreeBSD for Different Applications<br> Section 70. Traffic Shaping on FreeBSD<br> Section 71. Create an Emergency Repair Kit<br> Section 72. Use the FreeBSD Recovery Process<br> Section 73. Use the GNU Debugger to Analyze a Buffer Overflow<br> Section 74. Consolidate Web Server Logs<br> Section 75. Script User Interaction<br> Section 76. Create a Trade Show Demo<br> Chapter 8. Keeping Up-to-Date<br> Introduction<br> Section 77. Automated Install<br> Section 78. FreeBSD from Scratch<br> Section 79. Safely Merge Changes to /etc<br> Section 80. Automate Updates<br> Section 81. Create a Package Repository<br> Section 82. Build a Port Without the Ports Tree<br> Section 83. Keep Ports Up-to-Date with CTM<br> Section 84. Navigate the Ports System<br> Section 85. Downgrade a Port<br> Section 86. Create Your Own Startup Scripts<br> Section 87. Automate NetBSD Package Builds<br> Section 88. Easily Install Unix Applications on Mac OS X<br> Chapter 9. Grokking BSD<br> Introduction<br> Section 89. How'd He Know That?<br> Section 90. Create Your Own Manpages<br> Section 91. Get the Most Out of Manpages<br> Section 92. Apply, Understand, and Create Patches<br> Section 93. Display Hardware Information<br> Section 94. Determine Who Is on the System<br> Section 95. Spelling Bee<br> Section 96. Leave on Time<br> Section 97. Run Native Java Applications<br> Section 98. Rotate Your Signature<br> Section 99. Useful One-Liners<br> Section 9.13. Fun with X

2007-11-03

Hibernate In Action(英文)

A good book to learn Hibernate.

2007-10-07

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除