computer programming books

Learn about computer programming books, we have the largest and most updated computer programming books information on alibabacloud.com

-1-7 Java Network Programming Basic Knowledge point computer network TCP/IP protocol stack Communication Prerequisites TCP UDP

port number with a unique identity on the network can be combined to form a uniquely identifiable identifier socket. socket principle mechanism:? There are sockets on both ends of the communication. ? network communication is actually the communication between sockets. ? data is transmitted via IO between two sockets. UDP Transport Datagramsocket and Datagrampacket establish the sending end, the receiving end. set up the data package. invokes the Send receive method of th

The art of Computer Programming + Volume 2nd: Half-value Algorithm (third edition) PDF

: Network Disk DownloadThis book is the latest edition of the 2nd volume of the 7 volume of computer programming art, which is widely concerned by domestic and foreign industry. This volume gives a comprehensive introduction to the field of half-value algorithms, divided into two chapters, "Random number" and "arithmetic". This volume summarizes the main algorithm examples and the basic theory of these algo

MIT Introduction to Computer science and programming--class1

1.goal (target)computation Thinking (computational thinking)Understand code (read and write code) understand abilities and limits map problem into computation in the framework of a computer that transforms scientific issues2.knowledgeDeclarative Knowledge declarative knowledge states the truth, a description of the facts imperative knowledge procedural knowledge to the problem-solving process described3.Fixed-program

Computer small white self-taught software programming-. NET syntax basics of looping statements, pure tips dry

Write code also to read, love the whole stack, more love life. Daily update of original it programming techniques and daily practical videos.Our goal is: To play with the server Web development, to understand the mobile side, the computer client is a cinch.This tutorial is a basic tutorial for anyone who is interested in learning software development. Of course, because of the coherence of technology, it is

(MIT free course) Computer Science and Programming

This article from: http://news.cnblogs.com/n/92343/ I have previously recommended C/C ++ courses for MIT. Today I saw a group of free open courses on computer science and programming on their website (YouTube video ), after reading a few courses, I thought it was very systematic, and I felt like 1.1 million users. Although it is a theoretical course, we can feel that there is still a big gap in educ

Simple Network verification with http.get () to prevent customers from giving end-of-computer programming tutorial self-study

Starting from: Using Http.get () Simple network verification to prevent customers do not give the end of the computer computer programming introduction Tutorial self-studyhttp://jianma123.com/viewthread.aardio?threadid=428To the software and network verification is often needed to use the practical features, below a simple demonstration of how to use Http.get ()

Terminology interpretation in some aspects of computer programming

Computer programming The process of writing our ideas and requirements , in accordance with the rules and conventions that can make computers understand them, is programming. Software Development the process of programming is software development. Development Platform In the process of software development, we ne

8.PMAC host computer-VC programming environment configuration

The knowledge above is pe-win32 in the operation, is aimed at the PMAC subordinate machine programming, now began to explain how the PMAC host computer--pc to communicate with PMaC: to the PMAC to send control signals and to deal with the interrupt response of PMAC. This paper first describes the environment configuration of PMAC VC programming.1. Folder structur

Typical programming errors related to memory operations commonly found in "in-depth understanding of computer systems" C programs

Original address: http://blog.csdn.net/slvher/article/details/9150597Memory management is a big challenge for C + + programmers, it is absolutely worth the cautious, otherwise it is painful to let the module of tens of thousands of lines of code run up before the memory crashes. Because the location of the crash is in time and space, it is usually shown after a distance from the real source of the error. A few days ago on-line module due to heap memory write out of 1 bytes caused by various stra

Summary of basic knowledge of computer science and relevant content of mainstream programming language

This warehouse is mainly used to summarize the basic theoretical knowledge of computer science and the relevant content of mainstream programming language, each of which corresponds to a large direction.Main contentThe main computer base has the following major directions: DataBase Datastructure Linux_os Network Algorithm Math The

Some important algorithms in computer programming

transmitted through communication to increase the data density and ultimately reduce the storage space of data. Data compression is widely used in file storage and distributed systems. Data compression also represents the increase in size of media capacity and the expansion of network bandwidth. Diffie-Hellman key negotiation Diffie-Hellman key exchange (D-H) is a security protocol. It allows both parties to establish a key through insecure channels without any prior information from the ot

13._c Programming Preparation Computer Expertise

an octal output - - */ the - returni; -}9. How constants are represented in the C languageIntegerDecimal: The traditionalHex: Front plus 0x or 0XOctal: Front plus 0 Digit zero, non o1# include 2 3 intMainvoid)4 {5 inti =015;//octal front plus 06printf"i =%d\n", i);7 8 return 0;9 Ten}Floating point numberThe traditional notationfloat x = 3.2;Scientific counting methodfloat x = 3.2e3; The value of X is 3200float x = 123.45e-2; The value of X is 1.23451# include 2 3 intMainvo

The first part of computer programming language

Computer programming Languages:It is divided into machine language, assembly language, advanced languages and scripting languages.Machine language: Binary code consisting of 0 and 1.Assembly language: Changed to a slightly easier-to-understand statement written by humans.High-level language: the language in which business logic is expressed. Typically for interpreting classes (instant translation) and compi

Socket programming: Computer Network Basics

Socket programming: Computer Network Basics Before learning about networks, review the basics of computer networks. Lu Xun said that there is a huge copy of the article in the world. If you have any questions, you can copy the book based on your basic knowledge. A layered model 1. Why Layer In order to simplify the network design complexity, communication

On the understanding of computer programming language

, scripting language definition: A computer programming language created to shorten the traditional authoring-compile-link-run (edit-compile-link-run) process. It is characterized by: The program code is the final execution file, but this process requires the participation of the interpreter, so say scripting languages are very much associated with interpreted languages. The scripting language is us

C Programming style of human-computer Interaction-Cshell (provide source download)

print instance function!3, you can add variables, such as x=123;4, you can write a line of multiple expressions, separated by semicolons;5, you can assign the result of a function to a variable, such as X=functioncall (...), of course, the X must first exist or be created well;6, can be run in batches, execute For Cshell want to make some custom friends, can read cshellfuncs.c. The principle is very simple, is the input programming a binary tree, lef

python--Network Programming-----Computer Foundation

We usually use on the computer program such as: Thunder, WORD,QQ, Firefox, etc., these unified called application software, Python development is also the main development of this application software.If QQ this application wants to run, we must first download QQ installs the software, then installs on the operating system,But the operating system is also software, but it is a system software, software to allow must be on the hardware, that is, must h

Please look at this programming. Why the function of the computer is not available.

-5285480-82795426-1.shtmlhttp://blog.tianya.cn/post-5285480-82795431-1.shtmlhttp://blog.tianya.cn/post-5285480-82795441-1.shtmlhttp://blog.tianya.cn/post-5285480-82795453-1.shtmlhttp://blog.tianya.cn/post-5285480-82795459-1.shtmlhttp://blog.tianya.cn/post-5285480-82795465-1.shtmlhttp://blog.tianya.cn/post-5285480-82795471-1.shtmlhttp://blog.tianya.cn/post-5285480-82795478-1.shtmlhttp://blog.tianya.cn/post-5285480-82795482-1.shtmlhttp://blog.tianya.cn/post-5285480-82795487-1.shtmlhttp://blog.tian

The art of Computer Programming + volume 1th: Basic Algorithm (third edition) PDF

: Network Disk DownloadVolume 1th introduces the basic concepts and techniques of programming, and then explains in detail the content of information structure, including the representation of information inside the computer, the structure relationship between data elements, and the effective information processing methods. In addition, the book also describes the progr

C # Programming Get client computer hardware and System Information function code case study

This article mainly introduces C # programming to obtain client computer hardware and system Information function, can realize the client system CPU, hard disk, motherboard and other hardware information and client operating system, IP, Mac and other information operation skills, the need for friends can refer to the next This article describes the C # programming

Total Pages: 11 1 .... 7 8 9 10 11 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.