搜索结果: 16-30 共查到“计算机科学技术”相关记录59条 . 查询时间(0.283 秒)
This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; wh...
Excerpt
ave himself from cipherdom, find an affirmative position. His thousand and three affairs of gallantry, after becoming, at most, two immature intrigues leading to sordid and prolonged complic...
The Workshop on Electronic Texts (1) drew together representatives of various projects and interest groups to compare ideas, beliefs, experiences, and, in particular, methods of placing and presenting...
Excerpt
an user group and discusses the importance of Linux advocacy as one of the goals of a user group.
· Make speakers available to organizations interested in Linux.
· Issue press releases...
Excerpt
ADSM is a network-based backup system, sold by IBM, in use at many organizations. There are clients for a large variety of systems (different UNIX brands, Windows, Novell, Mac, Windows NT). ...
《Linux ACP Modem (Mwave) mini-HOWTO》(图)
Linux ACP Modem (Mwave) mini-HOWTO Mike Sullivan Paul Schroeder
2009/5/31
This document describes how to build, setup, and use the driver and user space application necessary for using the ACP (Mwave) Modem in the IBM Thinkpad 600, 600E, and 770 models which include the on ...
The Linux Accessibility HOWTO covers the use of adaptive technologies that are available for the Linux operating system, as well as the software applications and hardware devices that can be installed...
Excerpt
Novembre 1994
= Naissance des Chroniques de Cybérie, chronique hebdomadaire des actualités de l'internet et première lettre d'information électronique francophone
Février 1995
= Mis...
LE LIVRE 010101 - daté de septembre 2003 - est une synthèse sur tous les acteurs de l'édition numérique et l'apport des technologies numériques dans le monde du livre. L'internet et les technologies n...
Excerpt
ele-1983, but external conditions caused the `temporary' freeze to become permanent.
The AI Lab culture had been hit hard in the late 1970s by funding cuts and the resulting administrativ...
《How to Develop Accessible Linux Applications》(图)
How to Develop Accessible Linux Applications Sharon Snider
2009/5/31
Excerpt
2.1. Principles for Developing Accessible Applications
Developers need to consider the following needs of disabled users when developing an accessible application:
* Choice of input me...
Excerpt
arpa:myname): anonymous 331 ANONYMOUS user ok, send real ident as password. Password: myname 230 User ANONYMOUS logged in at Wed 17-Jun-87 12:01 PDT, job 15. ftp> get netinfo:nug.doc 200 Por...
《Hackers,Heroes of the Computer Revolution》(图)
Hackers,Heroes of the Computer Revolution Steven Levy
2009/5/31
ng of the word "any."
Dick Sunderland Chalk-complexioned MBA who believed that firm managerial bureaucracy was a worth goal, but as president of Sierra On-Line found that hackers didn't think that ...
This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; wh...
Excerpt
ad and do that, I am giving you express permission right now. Enjoy yourself.
You can put the book on disks and give the disks away, as long as you don't take any money for it.
But thi...