Flylib.com
List of Listings
Previous page
Table of content
Chapter 5: Fundamental Types
Listing 5-1: Justified printing using padding
Chapter 6: Arrays and Collections
Listing 6-1: Calculation of the Fibonacci series using iterators
Listing 6-2: A type that implements comparison and equality interfaces
Listing 6-3: Custom comparer, ascending and descending
Listing 6-4: An action collection
Listing 6-5: A converter-based collection
Chapter 7: I/O, Files, and Networking
Listing 7-1: Reading I/O asynchronously using a callback
Listing 7-2: Reading I/O asynchronously using a blocking wait
Listing 7-3: Watching for filesystem events
Listing 7-4: A simple socket-based file server
Listing 7-5: A simple HTTP echo server
Chapter 10: Threads, AppDomains, and Processes
Listing 10-1: A spin-lock
Listing 10-2: Plug-in isolation using AppDomains
Chapter 13: Regular Expressions
Listing 13-1: Capturing and printing simple XML elements
Listing 13-2: Regular expressions replacement
Chapter 14: Dynamic Programming
Listing 14-1: Cached reflection bindings using handles
Previous page
Table of content
Professional .NET Framework 2.0 (Programmer to Programmer)
ISBN: 0764571354
EAN: 2147483647
Year: N/A
Pages: 116
Authors:
Joe Duffy
BUY ON AMAZON
Qshell for iSeries
Path-Name Expansion
Grep
Sed
C and C++ Development Tools
Appendix A Summary of Changes by Release
Image Processing with LabVIEW and IMAQ Vision
Line-Scan Cameras
Color Images
Other Image Sources
Image Standards
Frequency Filtering
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
File System Forensic Analysis
Summary
Introduction
Bibliography
Hash Trees
Content Category
Extending and Embedding PHP
Zend Thread Safety
The Resource Data Type
Summary
Contexts
Appendix D. Additional Resources
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Oracle and PL/SQL
Indirect Privilege Escalation
Accessing the File System
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies