Flylib.com
Data Structures Demystified (Demystified)
Data Structures Demystified (Demystified)
ISBN: 0072253592
EAN: 2147483647
Year: 2006
Pages: 90
Authors:
James Keogh
,
Ken Davidson
BUY ON AMAZON
Table of Contents
BackCover
Data Structures Demystified
Introduction
Chapter 1: Memory, Abstract Data Types, and Addresses
Data and Memory
Reserving Memory
Memory Addresses
Quiz
Chapter 2: The Point About Variables and Pointers
Pointers
Quiz
Chapter 3: What Is an Array?
Declaring an Array
Multidimensional Arrays
Pointers and Arrays
An Array of Pointers
An Array of Pointers to Pointers
Quiz
Chapter 4: Stacks Using an Array
Inside a Stack
Creating a Stack in C
Creating a Stack in Java
Stack in Action Using C
Stack in Action Using Java
Quiz
Chapter 5: Queues Using an Array
Queues Using an Array in C
Queues Using An Array in Java
Quiz
Chapter 6: What Is a Linked List?
The Structure of a Linked List
Linked Lists Using C
Linked Lists Using Java
Quiz
Chapter 7: Stacks Using Linked Lists
LinkedList Class
The StackLinkedList Class
StackLinked List Using C
StackLinked List Using Java
Quiz
Chapter 8: Queues Using Linked Lists
The Linked List Queue
Linked List Queue Using C
Linked List Queue Using Java
Quiz
Chapter 9: Stacks and Queues: Insert, Delete, Peek, Find
Enhanced LinkedList Class Using C
Enhanced LinkedList Class Using Java
Quiz
Chapter 10: What Is a Tree?
Parts of a Binary Tree
Why Use a Binary Tree?
Creating a Binary Tree
Binary Tree Using C
Binary Tree Using Java
Quiz
Chapter 11: What Is a Hashtable?
Developing a Hashtable
Hashtable Using C
Hashtable Using Java
Quiz
Final Exam
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Data Structures Demystified (Demystified)
ISBN: 0072253592
EAN: 2147483647
Year: 2006
Pages: 90
Authors:
James Keogh
,
Ken Davidson
BUY ON AMAZON
CISSP Exam Cram 2
TELECOMMUNICATIONS AND NETWORK SECURITY
Auditing Your Security Infrastructure
Access-Control Types
Documents and Guidelines
Answers to Exam Prep Questions
Metrics and Models in Software Quality Engineering (2nd Edition)
Metrics for Software Maintenance
Scatter Diagram
Quality Management Models
In-Process Metrics for Software Testing
The Summarization Phase
Software Configuration Management
The DoD CM Process Model
Appendix A Project Plan
Appendix G Sample Inspection Plan
Appendix N Corrective Action Processing (CAP)
Appendix W Physical Configuration Audit (PCA) Checklist
Adobe After Effects 7.0 Studio Techniques
Good Habits and Best Practices
Effective Motion Tracking
Using 3D Tracking Data
Logic and Grammar
Light Source and Direction
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Internals
Snort
NFR Security
Security Business Issues
The Future of Intrusion Detection and Prevention
Mastering Delphi 7
Modeling and OOP Programming (with ModelMaker)
Working with ADO
Reporting with Rave
Web Programming with WebBroker and WebSnap
Appendix A Extra Delphi Tools by the Author
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies