10g_view.pdf


-
10g_view.pdf视图一本很好的oracle10g的视图,分享能够帮助每一个需要的人,但愿能帮助到大家

828KB
Jeecg-Boot+技术文档_2.0.pdf
2020-08-22Jeecg-Boot是一款基于BPM的低代码平台,零代码开发!采用前后端分离架构: SpringBoot 2.x,Ant Design&Vue,Mybatis-plus,Shiro,JWT。强大的代码生成器让前后端代码一键生成,无需写任何代码!!帮助Java项目解决70%的重复工作,让开发更关注业务逻辑,既能快速提高效率,节省研发成本,同时又不失灵活性!同时具备更强大的低代码能力:Online表单、Online报表、Online图表、表单设计、流程设计、报表设计、大屏设计 等等...
7.23MB
量子光学[Walls_D.F.,_G.J.Milburn.]QUANTUM OPTICS
2018-09-15量子光学经典教材,是量子计算的基础。物理概念清晰,推导简洁
4.35MB
ETG2200_V3i0i0_G_R_SlaveImplementationGuide.pdf
2020-08-04This document describes how to accomplish a successful EtherCAT® slave implementation from a generic and a practical point of view. It answers the following questions: 1. How is the EtherCAT slave architecture? 2. What steps have to be done to implement an EtherCAT slave? 3. Which documents are available for a successful device implementation? 4. What kinds of EtherCAT development components are available? What are the differences? 5. Is EtherCAT training available? 6. Is technical support available? 7. Why to attend a Plug Fest? 8. How to obtain conformance for EtherCAT devices?
4.51MB
L_G_Alexander_--_Longman_English_Grammar.pdf
2010-05-09Grammatical descriptions of English which are addressed to learners are often oversimplified and inaccurate This is the inevitable result of lack of time in the classroom and lack of space in course books and practice books Badly expressed and inaccurate rules, in turn, become enshrined in grammar books directed at teachers and students The misrepresentation of English grammar gives a false view of the language, perpetuates inaccurate 'rules', and results in errors in communication It is against this background that the Longman English Grammar has been written
189.96MB
大三下学期期末复习.zip
2019-06-17大三下学期期末复习: 卷 64G 的文件夹 PATH 列表 卷序列号为 364D-CC52 G:. │ ..txt │ ├─jsp课件 │ 1.ppt │ 2.ppt │ 3.ppt │ 4.ppt │ 5.ppt │ 6.ppt │ 7.ppt │ 8.ppt │ ├─matlab课件 │ 数字图像处理01.ppt │ 数字图像处理02-灰度处理.ppt │ 数字图像处理03-投影分割.ppt │ 数字图像处理04-形态学处理.ppt │ 数字图像处理05-形态学处理II.ppt │ 数字图像处理06-滤波.ppt │ 数字图像处理07-车牌处理彩色图像.ppt │ 数字图像处理08-图像梯度边缘追踪.ppt │ 数字图像处理09-模式识别.ppt │ ├─python课件 │ │ 069008-01.rar │ │ 样书.JPG │ │ 课件密码说明.doc │ │ │ ├─作业 │ │ python基础.docx │ │ │ ├─课件1 │ │ ├─第10章 网络程序设计 │ │ │ │ 第10章 网络程序设计.ppt │ │ │ │ │ │ │ └─code │ │ │ │ chatClient.py │ │ │ │ chatServer.py │ │ │ │ client.py │ │ │ │ flask_email.py │ │ │ │ flask_test.py │ │ │ │ ftpClient.py │ │ │ │ ftpServer.py │ │ │ │ getIP_MAC.py │ │ │ │ index.py │ │ │ │ index1.asp │ │ │ │ pachong.py │ │ │ │ port_scan.py │ │ │ │ receiver.py │ │ │ │ sender.py │ │ │ │ server.py │ │ │ │ sniffer.py │ │ │ │ sockMiddle.py │ │ │ │ sockMiddle_client.py │ │ │ │ sockMiddle_server.py │ │ │ │ udp_timeClient.py │ │ │ │ udp_timeServer.py │ │ │ │ │ │ │ ├─crawYichangGuishi │ │ │ │ │ result.txt │ │ │ │ │ scrapy.cfg │ │ │ │ │ │ │ │ │ └─crawYichangGuishi │ │ │ │ │ items.py │ │ │ │ │ pipelines.py │ │ │ │ │ settings.py │ │ │ │ │ __init__.py │ │ │ │ │ │ │ │ │ ├─spiders │ │ │ │ │ │ spiderYichangGuishi.py │ │ │ │ │ │ __init__.py │ │ │ │ │ │ │ │ │ │ │ └─__pycache__ │ │ │ │ │ spiderYichangGuishi.cpython-35.pyc │ │ │ │ │ __init__.cpython-35.pyc │ │ │ │ │ │ │ │ │ └─__pycache__ │ │ │ │ settings.cpython-35.pyc │ │ │ │ __init__.cpython-35.pyc │ │ │ │ │ │ │ ├─django_IsPrime │ │ │ │ │ db.sqlite3 │ │ │ │ │ manage.py │ │ │ │ │ │ │ │ │ └─django_IsPrime │ │ │ │ │ settings.py │ │ │ │ │ urls.py │ │ │ │ │ view.py │ │ │ │ │ wsgi.py │ │ │ │ │ __init__.py │ │ │ │ │ │ │ │ │ └─__pycache__ │ │ │ │ settings.cpython-35.pyc │ │ │ │ urls.cpython-35.pyc │ │ │ │ view.cpython-35.pyc │ │ │ │ wsgi.cpython-35.pyc │ │ │ │ __init__.cpython-35.pyc │ │ │ │ │ │ │ ├─django_template │ │ │ │ │ db.sqlite3 │ │ │ │ │ manage.py │ │ │ │ │ │ │ │ │ ├─django_template │ │ │ │ │ │ settings.py │ │ │ │ │ │ urls.py │ │ │ │ │ │ view.py │ │ │ │ │ │ wsgi.py │ │ │ │ │ │ __init__.py │ │ │ │ │ │ │ │ │ │ │ └─__pycache__ │ │ │ │ │ settings.cpython-35.pyc │ │ │ │ │ urls.cpython-35.pyc │ │ │ │ │ view.cpython-35.pyc │ │ │ │ │ wsgi.cpython-35.pyc │ │ │ │ │ __init__.cpython-35.pyc │ │ │ │ │ │ │ │ │ └─templates │ │ │ │ greeting.html │ │ │ │ │ │ │ ├─first_django │ │ │ │ │ db.sqlite3 │ │ │ │ │ manage.py │ │ │ │ │ │ │ │ │ └─first_django │ │ │ │ │ settings.py │ │ │ │ │ urls.py │ │ │ │ │ view.py │ │ │ │ │ wsgi.py │ │ │ │ │ __init__.py │ │ │ │ │ │ │ │ │ └─__pycache__ │ │ │ │ settings.cpython-35.pyc │ │ │ │ urls.cpython-35.pyc │ │ │ │ view.cpython-35.pyc │ │ │ │ wsgi.cpython-35.pyc │ │ │ │ __init__.cpython-35.pyc │ │ │ │ │ │ │ └─网络爬虫 │ │ │ GetUrl.py │ │ │ test.py │ │ │ WebCrawler.py │ │ │ │ │ ├─第11章 大数据处理 │ │ │ │ 第11章 大数据处理.ppt │ │ │ │ │ │ │ └─code │ │ │ 111.txt │ │ │ FileSplit.py │ │ │ Hadoop_map.py │ │ │ Hadoop_Reduce.py │ │ │ Map.py │ │ │ Reduce.py │ │ │ test.txt │ │ │ │ │ ├─第12章 Windows系统编程 │ │ │ │ 第12章 Windows系统编程.ppt │ │ │ │ │ │ │ └─code │ │ │ CheckAndViewAutoRunsInSystem.py │ │ │ CreateDialogWithButtonMessageUsingMFC.py │ │ │ CreateWindowUsingMFC.py │ │ │ CreateWindowUsingWinAPI.py │ │ │ EnumKeys.py │ │ │ EnumKeys3.py │ │ │ EnumProcess.py │ │ │ EventViewer.py │ │ │ Impersonate.py │ │ │ setup.py │ │ │ UsePrintfThroughCtypes.py │ │ │ │ │ ├─第13章 多线程与多进程编程 │ │ │ │ 第13章 多线程与多进程编程.ppt │ │ │ │ │ │ │ └─code │ │ │ FirstExample.py │ │ │ multiprocessing_eight.py │ │ │ multiprocessing_first.py │ │ │ multiprocessing_five.py │ │ │ multiprocessing_four.py │ │ │ multiprocessing_nine.py │ │ │ multiprocessing_second.py │ │ │ multiprocessing_seven.py │ │ │ multiprocessing_six.py │ │ │ multiprocessing_three.py │ │ │ MultiThread.py │ │ │ multiThread_copyFile.py │ │ │ SecondExample.py │ │ │ ThreadDaemon.py │ │ │ ThreadSynchronizationUsingCondition.py │ │ │ ThreadSynchronizationUsingEvent.py │ │ │ ThreadSynchronizationUsingLock.py │ │ │ ThreadSynchronizationUsingQueue.py │ │ │ │ │ ├─第14章 数据库编程 │ │ │ │ 第14章 数据库编程.ppt │ │ │ │ │ │ │ ├─code │ │ │ │ 14.1.4.py │ │ │ │ addressListManage.py │ │ │ │ data.db │ │ │ │ dataxlsx.db │ │ │ │ test_xlsx2sqlite.py │ │ │ │ tkinter_addressListManage.pyw │ │ │ │ │ │ │ └─sqlitebrowser_200_b1_win │ │ │ libgcc_s_dw2-1.dll │ │ │ mingwm10.dll │ │ │ Qt3Support4.dll │ │ │ QtCore4.dll │ │ │ QtGui4.dll │ │ │ QtNetwork4.dll │ │ │ QtSql4.dll │ │ │ QtXml4.dll │ │ │ SQLite Database Browser 2.0 b1.exe │ │ │ │ │ ├─第15章 多媒体编程 │ │ │ │ 第15章 多媒体编程.ppt │ │ │ │ │ │ │ └─code │ │ │ │ batchWaterMark.py │ │ │ │ biaotou1.png │ │ │ │ circlecenter.py │ │ │ │ GraphicDrawing.py │ │ │ │ ImageRonghe.py │ │ │ │ MusicPlayer.py │ │ │ │ pillow_ABC.py │ │ │ │ pyOpenGL_Bezier.pyw │ │ │ │ pyOpenGL_KeyboardEvent.pyw │ │ │ │ pyOpenGL_Line_Normal_Light.pyw │ │ │ │ pyOpenGL_Line_Triangle_Circle.pyw │ │ │ │ qipan.py │ │ │ │ sample.jpg │ │ │ │ sample_texture.bmp │ │ │ │ speech.py │ │ │ │ texturemap.py │ │ │ │ TextureMapping.py │ │ │ │ watermark.png │ │ │ │ watermarking.py │ │ │ │ yanzhengma.py │ │ │ │ │ │ │ └─testimages │ │ │ 1.bmp │ │ │ 2.bmp │ │ │ 3.bmp │ │ │ │ │ ├─第16章 软件逆向工程应用 │ │ │ │ 第16章 软件逆向工程应用.ppt │ │ │ │ │ │ │ └─code │ │ │ Collecting function chunks.py │ │ │ ColorTheInstructions.py │ │ │ FindInstructions.py │ │ │ FindLoop.py │ │ │ FindPacker.py │ │ │ FindPotentialGadgets.py │ │ │ FindTheDangerousFunctions.py │ │ │ GoThroughTheSegments.py │ │ │ Indegree and outdegree of functions.py │ │ │ InstructionTimes.py │ │ │ IterateChunks.py │ │ │ MnemonicsHistogram.py │ │ │ pedasm.py │ │ │ pescanner.py │ │ │ simpleapi.py │ │ │ ssdeep.exe │ │ │ ssdeeptest.py │ │ │ ssdeep_procs.py │ │ │ WalkTheFunctions.py │ │ │ WalkTheSegments.py │ │ │ │ │ ├─第17章 科学计算与可视化 │ │ │ └─code │ │ │ 13.5.11.py │ │ │ 13.5.13.py │ │ │ 3dGraphicUsingPylab.py │ │ │ 3dSurfaceUsingPyplot.py │ │ │ 3d_line.py │ │ │ instructionFig.py │ │ │ matplotlib_chinese.py │ │ │ matplotlib_in_tkinter.py │ │ │ pie_demo.py │ │ │ scipy_demo.py │ │ │ SinAndCosUsingPyplot.py │ │ │ SinCosSinUsingPyplot.py │ │ │ sin_cos.png │ │ │ slider_demo.py │ │ │ │ │ ├─第18章 密码学编程 │ │ │ └─code │ │ │ AES_test.py │ │ │ rsa_test.py │ │ │ │ │ ├─第19章 安卓平台的Python编程 │ │ │ └─code │ │ │ 19_8.py │ │ │ erweima.py │ │ │ │ │ ├─第1章 基础知识 │ │ │ │ 第1章 基础知识.ppt │ │ │ │ │ │ │ └─code │ │ │ 1_1.py │ │ │ 1_2.py │ │ │ 1_3.py │ │ │ CodeFramework.py │ │ │ convert2to3.py │ │ │ │ │ ├─第2章 Python序列 │ │ │ │ 第2章 Python序列.ppt │ │ │ │ │ │ │ └─code │ │ │ 2.4.3.py │ │ │ BinaryTree.py │ │ │ ComparePlusAndAppend.py │ │ │ CountForFrequences.py │ │ │ DirectedGraph.py │ │ │ InsertAndAppendOfList.py │ │ │ ListComprehension.py │ │ │ myQueue.py │ │ │ noRepeatNumbers.py │ │ │ shiftLeftn.py │ │ │ SortOrSoted.py │ │ │ Stack.py │ │ │ │ │ ├─第3章 选择与循环 │ │ │ │ 第3章 选择与循环.ppt │ │ │ │ │ │ │ └─code │ │ │ 例3_1.py │ │ │ 例3_10.py │ │ │ 例3_11.py │ │ │ 例3_12.py │ │ │ 例3_13.py │ │ │ 例3_14.py │ │ │ 例3_15.py │ │ │ 例3_16.py │ │ │ 例3_17.py │ │ │ 例3_18.py │ │ │ 例3_19.py │ │ │ 例3_2.py │ │ │ 例3_20.py │ │ │ 例3_21.py │ │ │ 例3_22.py │ │ │ 例3_23.py │ │ │ 例3_24.py │ │ │ 例3_3.py │ │ │ 例3_4.py │ │ │ 例3_5.py │ │ │ 例3_6.py │ │ │ 例3_7.py │ │ │ 例3_8.py │ │ │ 例3_9.py │ │ │ 多分支选择结构.py │ │ │ 嵌套选择结构.py │ │ │ 跳转表.py │ │ │ │ │ ├─第4章 字符串与正则表达式 │ │ │ │ 第4章 字符串与正则表达式.ppt │ │ │ │ │ │ │ └─code │ │ │ CheckCodeFormats.py │ │ │ checkPwd.py │ │ │ FindIdentifiersFromPyFile.py │ │ │ randomInformation.py │ │ │ │ │ ├─第5章 函数的设计和使用 │ │ │ │ 第5章 函数的设计和使用.ppt │ │ │ │ │ │ │ └─code │ │ │ 24点.py │ │ │ 5_1.py │ │ │ 5_10.py │ │ │ 5_11.py │ │ │ 5_2.py │ │ │ 5_3.py │ │ │ 5_4.py │ │ │ 5_5.py │ │ │ 5_6.py │ │ │ 5_7.py │ │ │ 5_8.py │ │ │ 5_9.py │ │ │ nestedList.py │ │ │ 一维卷积.py │ │ │ 八皇后.py │ │ │ 双色球.py │ │ │ 因数分解.py │ │ │ 报数游戏.py │ │ │ 汉诺塔.py │ │ │ 猜数游戏.py │ │ │ 红包游戏.py │ │ │ 韩信点兵.py │ │ │ 黑洞数.py │ │ │ │ │ ├─第6章 面向对象程序设计 │ │ │ │ 第6章 面向对象程序设计.ppt │ │ │ │ │ │ │ └─code │ │ │ AccessMembersOfBaseclass.py │ │ │ MyArray.py │ │ │ myMatrix.py │ │ │ mySet.py │ │ │ │ │ ├─第7章 文件操作 │ │ │ │ 第7章 文件操作.ppt │ │ │ │ │ │ │ └─code │ │ │ 7_10.py │ │ │ 7_11.py │ │ │ 7_21.py │ │ │ 7_22.py │ │ │ 7_23.py │ │ │ 7_24.py │ │ │ 7_24_1.py │ │ │ 7_8.py │ │ │ 7_9.py │ │ │ autoBackup.py │ │ │ CheckRepeatedCharacterInWordDocument.py │ │ │ CheckTheMD5ValueOfAFile.py │ │ │ CheckTypeOfFile.py │ │ │ ComputeMD5OfFile.py │ │ │ CountDirSize.py │ │ │ delCertainFiles.py │ │ │ Excel2007_MaxGrade.py │ │ │ filetypes.txt │ │ │ FindLongestReuse.py │ │ │ IntegersSort.py │ │ │ isPE.py │ │ │ kousuan.pyw │ │ │ li_fig_fromDocx.py │ │ │ mergeExcelSheets.py │ │ │ ObjectSequencing.py │ │ │ pwddict.txt │ │ │ pywin32_excel.py │ │ │ RarZipFilesDecrypt.py │ │ │ sample.txt │ │ │ sample_pickle.dat │ │ │ searchZeroFiles.py │ │ │ textopenpyxl.py │ │ │ txt2xlsx.py │ │ │ userWindows_monitor.py │ │ │ write_xls.py │ │ │ │ │ ├─第8章 异常处理结构与程序调试 │ │ │ │ 第8章 异常处理结构与程序调试.ppt │ │ │ │ │ │ │ └─code │ │ │ doctest_demo.py │ │ │ Stack.py │ │ │ test_Stack.py │ │ │ │ │ └─第9章 GUI编程 │ │ │ 第9章 GUI编程.ppt │ │ │ │ │ └─code │ │ open.png │ │ SimplePaint.py │ │ tkinter_DigitalWatch.pyw │ │ tkinter_kousuan.pyw │ │ tkinter_login.pyw │ │ tkinter_MP3Player.py │ │ tkinter_MultipleWindowsDemo.pyw │ │ tkinter_notepad.pyw │ │ tkinter_paint.pyw │ │ tkinter_RegionCapture.py │ │ tkinter_RemoteDesktopMonitor_Client.pyw │ │ tkinter_RemoteDesktopMonitor_Server.pyw │ │ tkinter_selection.pyw │ │ wxComboBox.py │ │ wxGUI.py │ │ wxGUI_resize.py │ │ wxIsPrime.py │ │ wxListBox.py │ │ wxTreeCtrl.py │ │ │ └─课件2加密 │ Python7.5折京东热卖.jpg │ Python教学视频(微信版).png │ 《Python程序设计》教学大纲(参考).doc │ 第17章 科学计算与可视化.ppt │ 第18章 密码学编程.ppt │ 第19章 安卓平台的Python编程.ppt │ ├─移动终端开发软件 │ 1.ppt │ 10.ppt │ 2.ppt │ 3.ppt │ 4.ppt │ 5.ppt │ 6.ppt │ 8.ppt │ 课程介绍.ppt │ ├─课件 │ ├─第一章 │ │ 第一章.pptx │ │ │ ├─第七章 │ │ 第七章.pptx │ │ │ ├─第三章 │ │ 第三章.pptx │ │ │ ├─第九章 │ │ 第九章.pptx │ │ │ ├─第二章 │ │ 第二章.pptx │ │ 高清视频短片三维数据可视化3Te001694_标清.mp4 │ │ │ ├─第五章 │ │ 第五章.pptx │ │ │ ├─第八章 │ │ 决策树补充.pptx │ │ 第八章.pptx │ │ │ ├─第六章 │ │ 第2章 基本数据挖掘技术-关联规则v2.pptx │ │ 第六章.pptx │ │ │ ├─第十一章 │ │ 第十一章.pptx │ │ │ ├─第十章 │ │ 第十章.pptx │ │ │ ├─第四章 │ │ 第四章.pptx │ │ │ └─课程介绍 │ 课程简介.pptx │ └─软件工程导论课件 03章 需求分析.ppt 05章 总体设计.ppt 06章 详细设计.ppt 07章 实现.ppt 08章 维护.ppt 13章 软件项目管理.ppt hello world.txt 人月神话.pdf 关于软件分层的描述.docx 第01章_软件工程学概述.ppt 第2章 可行性研究.ppt 英语翻译.pptx 课堂分享.txt 课堂分享2(驱动程序与存根程序).docx 预备齐,走.pptx
1.14MB
网上查分系统 网上查分系统数据库设计
2009-12-20网上查分系统是用visual studio 2005 和sql 2005 开发的
4.67MB
The.Way.To.Go 文字版.pdf
2012-06-26Contents Preface................................................................................................................................. xix PART 1—WHY LEARN GO—GETTING STARTED Chapter 1—Origins, Context and Popularity of Go...............................................................1 1.1 Origins and evolution................................................................................................1 1.2 Main characteristics, context and reasons for developing a new language....................4 1.2.1 Languages that influenced Go.........................................................................4 1.2.2 Why a new language?......................................................................................5 1.2.3 Targets of the language....................................................................................5 1.2.4 Guiding design principles...............................................................................7 1.2.5 Characteristics of the language........................................................................7 1.2.6 Uses of the language........................................................................................8 1.2.7 Missing features?.............................................................................................9 1.2.8 Programming in Go......................................................................................10 1.2.9 Summary......................................................................................................10 Chapter 2—Installation and Runtime Environment............................................................11 2.1 Platforms and architectures.....................................................................................11 (1) The gc Go-compilers:..................................................................................11 (2) The gccgo-compiler:....................................................................................13 (3) File ex
4.33MB
Spring MVC Beginner-s Guide.pdf
2018-03-11Author: Amuthan G ISBN-10: 1783284870 Year: 2014 Pages: 545 Language: English File format: PDF Category: Java Book Description: The MVC architecture for developing web applications continues to be a powerful concept and the most popular design pattern known by developers. Spring MVC is a model-view-controller framework for Java web applications to simplify the writing and testing of Java web applications, which fully integrates with the Spring dependency injection framework. With the power of annotation-based configuration, Spring MVC makes web application development easy for developers. This book is a great companion for beginners who want to learn Spring MVC. With the help of real-world examples, you will learn how to create a completely functional web application. You will also get a complete overview of the Spring web development environment and all its key components.
715KB
Advanced.PDF.Password.Recovery.PRO.v2.12
2009-03-18Advanced PDF Password Recovery Pro (APDFPRP) is a program to decrypt protected Adobe Acrobat PDF files, which have "user" ("open") and/or "owner" ("security, "master") passwords set, and to recover these passwords. Owner-level protection allows to prevent PDF file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields (in any combination); user-level one locks the file so the password is requiored to open/view the file. If only "owner" password is set, decryption is being done instantly; decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print/annotate functions enabled. Alternatively, "owner" password can be recovered using brute-force or dictionary attacks; for "user" password, these attacks are required in any case. In addition, files with "user" password can be recovered in a reasonable time using "key search" attack. Please note that some limitations still apply (see help file for more details about Adobe Acrobat encryption levels and complete description/limitations of attacks mentioned above). All versions of Adobe Acrobat (including 5.0, which features 56..128-bit encryption: PDF 1.4 specification) are supported.
1.7MB
A Guide to Complex Variables (Steven G. Krantz 2007).pdf
2010-08-22高清PDF文件 Preface Most every mathematics Ph.D. student must take a qualifying exam in com- plex variables. The task is a bit daunting. This is one of the oldest areas in mathematics, it is beautiful and compelling, and there is a plethora of material. The literature in complex variables is vast and diverse. There are a great many textbooks in the subject, but each has a different point of view and places different emphases according to the tastes of the author. Thus it is a bit difficult for the student to focus on what are the essential parts of this subject. What must one absolutely know for the qualifying exam? What will be asked? What techniques will be stressed? What are the key facts? The purpose of this book is to answer these questions. This is definitely not a comprehensive textbook like [GRK]. It is rather an entree to the disci- pline. It will tell you the key ideas in a first-semester graduate course in the subject, map out the important theorems, and indicate most of the proofs. Here by “indicate” we mean that (i) if the proof is short then we include it, (ii) if the proof is of medium length then we outline it, and bf (iii) if the proof is long then we sketch it. This book has plenty of figures, plenty of examples, copious commentary, and even in-text exercises for the students. But, since it is not a formal textbook, it does not have exercise sets. It does not have a Glossary or a Table of Notation. This is meant to be a breezy book that you could read at one or two sittings, just to get the sense of what this subject is about and how it fits together. In that wise it is quite different from a typical mathematics text or monograph. After reading this book (or even while reading this book), you will want to pick up a more traditional and comprehensive tome and work your way through it. The present book will get you started on your journey.
9.40MB
[大家网]Microsoft.PowerShell,VBScript&JScript;.Bible[www.TopSage.com].pdf
2019-08-15xvi Contents Running Programs from Within Scripts ...........................................................................121 Starting an application ............................................................................................121 Passing arguments to an application .......................................................................122 Additional features for Run .....................................................................................122 Running Scripts Remotely ................................................................................................124 Combining JScript and VBScript ......................................................................................126 Summary ..........................................................................................................................128 Input, Output, and Error Handling with VBScript and JScript Chapter 7: . . .129 Input and Output Essentials .............................................................................................129 Using Input Boxes ............................................................................................................131 Input box basics ......................................................................................................131 Setting default values for input boxes .....................................................................132 Positioning input boxes ..........................................................................................132 Converting input values ..........................................................................................132 Using Message Boxes ........................................................................................................133 Message box basics .................................................................................................133 Adding buttons .......................................................................................................134 Adding icons ...........................................................................................................135 Evaluating button clicks .........................................................................................136 Help fi les for message boxes ...................................................................................137 Using pop-up dialog boxes .....................................................................................137 Error Detection and Handling ..........................................................................................141 Handling runtime errors in VBScript .....................................................................141 Preventing runtime errors from halting script execution ..............................141 Checking for and catching errors in VBScript ...............................................144 Manually generating runtime errors .............................................................146 Handling runtime errors in JScript .........................................................................147 Checking for and catching errors in JScript ..................................................147 Throwing errors ............................................................................................148 Other error-handling techniques ..................................................................150 Summary ..........................................................................................................................152 Working with Files and Folders in VBScript and JScript Chapter 8: . . . . . . .153 Understanding the FileSystemObject ...............................................................................153 FSO objects and collections ....................................................................................154 FSO methods and properties ..................................................................................154 Using the FileSystemObject ....................................................................................156 Working with Folders .......................................................................................................156 Checking folder contents ........................................................................................157 Examining folder properties ...................................................................................159 Creating folders ......................................................................................................163 Copying, moving, and deleting folders ...................................................................164 Issues for multiple folders .......................................................................................164 Using DeleteFolder ........................................................................................164 Using CopyFolder .........................................................................................165 Using MoveFolder .........................................................................................166 86804ftoc.indd xvi 1/22/09 11:53:41 AM xvii Contents Issues for individual folders ....................................................................................167 Using Delete ..................................................................................................167 Using Copy ...................................................................................................167 Using Move ...................................................................................................168 Using Special Folders .......................................................................................................168 Working with Files ...........................................................................................................170 Examining fi le properties .......................................................................................170 Creating fi les ...........................................................................................................173 Copying, moving, and deleting fi les .......................................................................175 Issues for multiple fi les ...........................................................................................175 Using DeleteFile ............................................................................................176 Using CopyFile .............................................................................................176 Using MoveFile .............................................................................................177 Issues for individual fi les ........................................................................................178 Using Delete ..................................................................................................178 Using Copy ...................................................................................................179 Using Move ...................................................................................................180 Summary ..........................................................................................................................180 Reading and Writing Files Chapter 9: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181 Opening Files ...................................................................................................................181 Using OpenTextFile ................................................................................................182 Using OpenAsTextStream .......................................................................................183 Reading Text Files ............................................................................................................184 Preparing to read ....................................................................................................184 Reading characters ..................................................................................................187 Reading lines ..........................................................................................................188 Reading an entire fi le ..............................................................................................190 Skipping Lines in a File ....................................................................................................190 Skipping characters ................................................................................................191 Skipping lines .........................................................................................................191 Writing to a File ...............................................................................................................192 Preparing to write ...................................................................................................192 Writing characters ..................................................................................................194 Writing lines ...........................................................................................................194 Writing blank lines .................................................................................................194 Summary ..........................................................................................................................195 Managing Drives and Printers with VBScript and JScript Chapter 10: . . . . .197 Managing Drives ..............................................................................................................197 Obtaining Drive Information............................................................................................197 Checking for a drive ...............................................................................................198 Using the Drive object ............................................................................................199 Examining all drives on a system ...........................................................................202 Mapping Network Drives .................................................................................................204 Connecting to a network share ...............................................................................204 Disconnecting from a network share ......................................................................205 86804ftoc.indd xvii 1/22/09 11:53:41 AM xviii Contents Managing Network Printers .............................................................................................206 Setting a default printer ..........................................................................................206 Adding printer connections ....................................................................................206 Removing printer connections ................................................................................208 Summary ..........................................................................................................................209 Confi guring Menus, Shortcuts, and Startup Applications Chapter 11: . . . . .211 Working with Menus, Desktops, and Startup Applications ..............................................212 Creating Shortcuts and Menu Options .............................................................................213 Obtaining a target folder for the shortcut ................................................................213 Obtaining a shortcut object ....................................................................................214 Setting properties for link shortcuts .......................................................................216 Setting shortcut arguments ...........................................................................216 Setting shortcut hotkeys ................................................................................217 Setting icon locations ....................................................................................218 Setting working directories ...........................................................................219 Setting properties for URL shortcuts .......................................................................220 Managing Shortcuts and Menus .......................................................................................220 Creating menus.......................................................................................................220 Accessing and listing menu options ........................................................................221 Updating current shortcuts and menu options .......................................................224 Deleting shortcuts and menu options .....................................................................225 Deleting menus .......................................................................................................226 Adding and Removing Startup Applications .....................................................................227 Adding startup options ...........................................................................................227 Removing startup options .......................................................................................227 Moving startup options ..........................................................................................228 Summary ..........................................................................................................................229 Working with the Windows Registry and Event Logs Chapter 12: . . . . . . . .231 Working with the Windows Registry ...............................................................................231 Understanding the registry structure ......................................................................232 Reading registry keys and values ............................................................................233 Writing registry keys and values ............................................................................234 Creating new keys ..................................................................................................235 Deleting registry keys and values............................................................................236 Reconfi guring network services through the registry .............................................236 Managing WINS through Windows scripts ..................................................237 Managing DHCP through Windows scripts ..................................................239 Using Event Logs ..............................................................................................................242 Viewing event logs ..................................................................................................242 Understanding event entries ...................................................................................243 Archiving event logs ...............................................................................................244 Writing to Event Logs .......................................................................................................245 Event logging basics ...............................................................................................245 Working with the LogEvent method .......................................................................246 86804ftoc.indd xviii 1/22/09 11:53:41 AM xix Contents Reading Event Logs ..........................................................................................................248 Introducing Dumpel ...............................................................................................248 Using Dumpel .........................................................................................................249 Working with Dumpel in scripts ............................................................................251 Generating Event Log Reports ..........................................................................................253 Step 1: Creating the logs .........................................................................................253 Step 2: Formatting the logs for viewing ..................................................................255 Summary ..........................................................................................................................261 Part III: Network and Directory Service Scripting Scheduling One-time and Recurring Tasks Chapter 13: . . . . . . . . . . . . . . . .265 Scheduling Local and Remote Jobs ...................................................................................265 Scheduling basics ...................................................................................................265 Synchronizing the system time ...............................................................................267 Scheduling utilities .................................................................................................269 Using the Graphical Task Scheduler .................................................................................269 Running the wizard ................................................................................................269 Viewing wizard tasks ..............................................................................................273 Changing task properties ........................................................................................274 Scheduling Jobs with AT ..................................................................................................275 Using the AT Scheduler ..........................................................................................275 Viewing scheduled AT jobs .....................................................................................276 Deleting scheduled AT jobs ....................................................................................277 Scheduling with Scripts....................................................................................................278 Using AT in a script ................................................................................................278 Automated job creation ...........................................................................................280 Deleting jobs using scripts ......................................................................................282 Creating a scheduling manager script .....................................................................283 Summary ..........................................................................................................................287 Managing Computer and User Scripts Chapter 14: . . . . . . . . . . . . . . . . . . . .289 Why Use Computer and User Scripts? ..............................................................................289 Introducing Group Policies ...............................................................................................290 How are policies used?............................................................................................290 When are policies applied? .....................................................................................292 How are local group policies managed? ..................................................................292 How are global group policies managed? ................................................................294 Using the policy consoles .......................................................................................295 Working with Computer and User Scripts .......................................................................296 Managing startup and shutdown scripts .................................................................296 Managing logon and logoff scripts ..........................................................................298 Alternatives to group policy ....................................................................................299 Summary ..........................................................................................................................300 86804ftoc.indd xix 1/22/09 11:53:41 AM xx Contents Introducing Active Directory Chapter 15: Services Interfaces . . . . . . . . . . . .301 ADSI Essentials ................................................................................................................301 Understanding ADSI providers ...............................................................................302 Understanding the ADSI architecture .....................................................................303 Binding ADSI objects .............................................................................................303 Taking Advantage of ADSI ................................................................................................306 Working with the ADSI LDAP provider ..................................................................306 Working with the ADSI WinNT provider ...............................................................309 Working with the ADSI NDS provider ...................................................................312 Working with the ADSI NWCOMPAT provider......................................................315 ADSI Provider Basics ........................................................................................................317 Generic object binding ...........................................................................................317 Handling authentication and security.....................................................................318 Accessing properties and updating objects .............................................................322 Working with IADs Properties ......................................................................322 Working with IADs methods ..................................................................................325 Summary ..........................................................................................................................329 Using Schema to Master ADSI Chapter 16: . . . . . . . . . . . . . . . . . . . . . . . . .331 Exploring ADSI Schema ...................................................................................................331 The core WinNT object model ................................................................................332 The core LDAP object model...................................................................................333 Working with Schema Class Objects ................................................................................336 Accessing an object’s schema class..........................................................................336 Checking to see if an object is a container ..............................................................337 Examining mandatory and optional properties ......................................................338 Viewing Property Syntax, Ranges, and Values ..................................................................341 Accessing the IADsProperty interface .....................................................................341 Examining object properties ...................................................................................342 Summary ..........................................................................................................................346 Managing Local and Domain Resources with ADSI Chapter 17: . . . . . . . . . .347 Managing Domain Account Policies .................................................................................347 Working with domain objects ................................................................................348 Preparing to view and set account policies .............................................................349 Viewing and setting account policies ......................................................................350 Using MinPasswordLength ...........................................................................350 Using MinPasswordAge and MaxPasswordAge .............................................350 Using PasswordHistoryLength ......................................................................351 Using MaxBadPasswordsAllowed, AutoUnlockInterval, and LockoutObservationInterval .............................................................352 Working with Local Computer Properties ........................................................................353 Creating and Modifying User Accounts ............................................................................356 User properties for WinNT .....................................................................................356 Working with user account properties ...................................................................359 Managing user accounts with WinNT ....................................................................368 86804ftoc.indd xx 1/22/09 11:53:41 AM xxi Contents Creating user accounts with WinNT ......................................................................368 Deleting user accounts with WinNT.......................................................................369 Setting and changing passwords .............................................................................370 Checking group membership .................................................................................370 Creating and Modifying Group Accounts .........................................................................372 Understanding Windows group types ....................................................................373 Creating groups with WinNT .................................................................................373 Checking group membership .................................................................................374 Adding and removing group members ...................................................................375 Summary ..........................................................................................................................376 Service and Resource Administration with ADSI Chapter 18: . . . . . . . . . . . .377 Managing Windows Services ............................................................................................377 Using and understanding Windows services ..........................................................377 Working with service objects..................................................................................382 Using service object properties ...............................................................................386 Checking Service Status and Dependencies .....................................................................390 Viewing and Setting Service Information .........................................................................395 Starting, Stopping, and Pausing Services ..........................................................................396 Managing Open Resources and User Sessions ..................................................................402 Viewing open fi les and user sessions ......................................................................403 Viewing resources and sessions in scripts ..............................................................404 Working with Resource and Session objects ...........................................................407 Summary ..........................................................................................................................411 Maintaining Shared Directories, Chapter 19: Printer Queues, and Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413 Working with Shared Folders ...........................................................................................413 Folder sharing essentials.........................................................................................414 Examining shared folders and their properties .......................................................415 Creating and deleting shared folders ......................................................................417 Managing Print Queues ....................................................................................................418 Examining print queues .........................................................................................418 Using the PrintQueue object ...................................................................................420 Using a banner page ......................................................................................422 Working with general printer information ....................................................423 Prioritizing print queues and print jobs ........................................................424 Scheduling print queue availability...............................................................425 Checking print queue status .........................................................................425 Managing print queues ...........................................................................................429 Controlling Print Jobs ......................................................................................................430 Examining print job properties ..............................................................................430 Monitoring print job status .....................................................................................433 Pausing and resuming print jobs ............................................................................437 Summary ..........................................................................................................................438 86804ftoc.indd xxi 1/22/09 11:53:41 AM xxii Contents Managing Active Directory Domain Extensions Chapter 20: . . . . . . . . . . . .439 Working with Naming Contexts and the RootDSE Object ...............................................439 Binding to a naming context ...................................................................................439 Using RootDSE properties ......................................................................................440 Accessing Active Directory Schema ..................................................................................444 Installing and starting ADSI Edit ............................................................................444 Examining the domain-naming context .................................................................445 Common Active Directory objects ..........................................................................447 Managing Computer Objects with LDAP .........................................................................448 Active Directory computer object properties ..........................................................448 Creating and deleting computer accounts with LDAP ............................................451 Moving and renaming computer accounts with LDAP ...........................................452 Enabling and disabling computer accounts with LDAP ..........................................454 Managing Contacts with LDAP ........................................................................................455 Managing Groups with LDAP ...........................................................................................459 Active Directory group object properties ................................................................459 Creating groups with LDAP ....................................................................................460 Deleting, moving, and renaming groups with LDAP ..............................................462 Checking group membership with LDAP ...............................................................464 Adding and removing group members with LDAP .................................................465 Working with Organizational Units .................................................................................466 Examining organizational unit properties ..............................................................466 Creating organizational units .................................................................................467 Modifying organizational units ..............................................................................468 Moving, renaming, and deleting organizational units ............................................469 Managing User Accounts with LDAP ...............................................................................470 Examining user object properties with LDAP .........................................................470 Creating user accounts with LDAP .........................................................................474 Setting user account fl ags .......................................................................................476 Viewing group membership ....................................................................................478 Moving, renaming, and deleting user accounts with LDAP ....................................478 Summary ..........................................................................................................................479 Part IV: Windows PowerShell Input, Output, and Error Handling in PowerShell Chapter 21: . . . . . . . . . .483 Output to the Console .....................................................................................................483 A Little Diversion into Strings .........................................................................................484 Implicit and Explicit Output ...........................................................................................490 Verbose and Debug Output ..............................................................................................492 Managing Different Outputs from Cmdlets ......................................................................494 More on Error Output .....................................................................................................496 Session Transcripts ...........................................................................................................499 86804ftoc.indd xxii 1/22/09 11:53:41 AM xxiii Contents Tracking Progress .............................................................................................................501 Taking More Control of Formatting..................................................................................502 Sorting and Selecting Fields ............................................................................................505 Changing How PowerShell Formats Objects ....................................................................509 Creating Custom Objects on Demand ..............................................................................512 Techniques for Switching in Output .................................................................................514 Additional Output Cmdlets .............................................................................................515 Outputting in Specifi c File Formats .................................................................................516 Every Export Has a Corresponding Import ......................................................................518 More on Selecting Text .....................................................................................................520 User Input ........................................................................................................................521 Summary ..........................................................................................................................522 Working with Files and the Registry in PowerShell Chapter 22: . . . . . . . . . .523 Using PSDrives, Accessing the File System, Mapping Drives ............................................523 Changing (setting) locations ...................................................................................526 Getting child items (a.k.a. getting a directory) and testing paths ............................526 Copying, deleting and renaming fi les ....................................................................529 Creating and deleting directories ............................................................................530 File properties and attributes ..................................................................................531 Viewing and setting ACL permissions ....................................................................531 Working with fi le items: reading their content, creating and adding to them .........533 Selecting strings and working with text data ..........................................................534 Parsing text ............................................................................................................536 Working with the Registry .....................................................................................537 Summary ..........................................................................................................................539 Event Logging, Services, and Chapter 23: Process Monitoring with PowerShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .541 Working with Services .....................................................................................................541 Starting, Stopping, Suspending, Resuming, and Restarting Services................................545 Stopping a service ..................................................................................................545 Starting a service ....................................................................................................546 Restarting a service ................................................................................................546 Suspending and resuming services .........................................................................547 Confi guring services ..............................................................................................548 Working with Processes ...................................................................................................549 Starting, fi nding, and stopping processes ...............................................................549 Working with Event Logs .................................................................................................552 Clearing an event log ..............................................................................................552 Exporting event logs ..............................................................................................553 Finding entries in the event log ..............................................................................554 Summary ..........................................................................................................................556 86804ftoc.indd xxiii 1/22/09 11:53:41 AM xxiv Contents Working with Active Directory Using ADSI and PowerShell Chapter 24: . . .557 A Quick Introduction to Active Directory ........................................................................557 Directory activities .................................................................................................558 Caution ...................................................................................................................558 PowerShell and ADSI ..............................................................................................559 Getting Entries from AD with [ADSI] ...............................................................................559 Creating Objects ...............................................................................................................563 Getting Directory Entries with the Searcher .....................................................................564 It’s a date Jim, but not as we know it ......................................................................567 LDAP fi lters ...........................................................................................................568 Building a library of AD functions ..........................................................................570 Finding related entries in AD ................................................................................572 Operations on Directory Entries ......................................................................................574 Creating objects .....................................................................................................574 Setting single-valued properties ..............................................................................575 User Account Control flags ...........................................................................576 Setting passwords .........................................................................................577 Setting group types .......................................................................................577 Adding to (and deleting from) multivalued properties ............................................578 Moving and deleting objects ...................................................................................578 Testing for the presence of an entry ........................................................................579 Summary ..........................................................................................................................579 Working with WMI in PowerShell Chapter 25: . . . . . . . . . . . . . . . . . . . . . . .581 Displaying WMI Information ...........................................................................................583 Querying WMI .................................................................................................................586 Choosing to how to write the query .......................................................................587 Finding WMI objects by association ......................................................................588 The WMI Type Accelerators ..................................................................................592 Querying Across Computers ............................................................................................594 Logging on to the remote computer ..............................................................595 Discovering WMI Objects ...............................................................................................596 WMI Object Properties.....................................................................................................596 Updating WMI Objects ...................................................................................................597 WMI Object Methods .......................................................................................................599 A Case Study for WMI: Server 2008 Hyper-V ..................................................................600 Summary ..........................................................................................................................602 Part V: Windows Scripting Libraries Library: File-System Utilities Chapter 26: . . . . . . . . . . . . . . . . . . . . . . . . . . .607 Examining the File-System Utility Library .......................................................................607 Using the File-System Utility Library ...............................................................................618 Using GetSubFolders, GetFiles, and GetFolderContents .........................................619 Using CheckExists ..................................................................................................620 86804ftoc.indd xxiv 1/22/09 11:53:41 AM xxv Contents Using GetInfo, GetSize, and GetType .....................................................................620 Setting and clearing fi le attributes ..........................................................................620 Working with special folders, shortcuts, and menus ..............................................621 Managing menu options .........................................................................................623 Adding to the desktop and Start menu ...................................................................625 Using NewFolder and NewFile ...............................................................................627 Using DeleteFile, DeleteFolder, and DeleteShortcut ................................................628 Summary ..........................................................................................................................628 Library: I/O Utilities Chapter 27: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .629 Examining the I/O Utility Library ....................................................................................629 Using the I/O Utility Library ............................................................................................634 Handling fi le I/O with the utility library ................................................................634 Handling other I/O tasks with the utility library ....................................................636 Summary ..........................................................................................................................638 Library: Network Resource Utilities Chapter 28: . . . . . . . . . . . . . . . . . . . . .639 Examining the Network Resource Utility Library ............................................................639 Using the Network Resource Utility Library .....................................................................651 Using GetDriveInfo .................................................................................................651 Using CheckFreeSpace ...........................................................................................652 Using MapDrive ......................................................................................................653 Working with printers ............................................................................................653 Viewing, checking, and managing services ............................................................654 Using checkRS and viewDetailedRS .......................................................................656 Using viewShareInfo, createShare, and deleteShare ................................................657 Summary ..........................................................................................................................657 Library: Account Management Utilities Chapter 29: . . . . . . . . . . . . . . . . . .659 Building the Account Management Library ......................................................................659 Using the Account Management Utilities .........................................................................677 Confi guring domain account policies with the library utilities ..............................677 Managing groups with the library utilities .............................................................678 Managing users with the library utilities ................................................................680 Managing computers with the library utilities ........................................................682 Functions for renaming and moving accounts ........................................................684 Summary ..........................................................................................................................684 Library: Building a PowerShell Library Chapter 30: . . . . . . . . . . . . . . . . . . .685 Customizing Your PowerShell Environment .....................................................................685 Exploring the PowerShell host ................................................................................687 The PowerShell Prompt ..........................................................................................689 Adding more to the environment ............................................................................689 A Generic “choose” Function ...........................................................................................691 Network Utilities ..............................................................................................................693 Finding Network adapters ......................................................................................693 86804ftoc.indd xxv 1/22/09 11:53:41 AM xxvi Contents Get-Ipconfi g ............................................................................................................697 Ping ........................................................................................................................703 Clever Uses for Hash Tables .............................................................................................704 COM Objects: A Firewall Tool ..........................................................................................705 Using .NET Objects to Access Mail and Web Services .....................................................711 Sending mail ...........................................................................................................711 Using the Web client object and XML ....................................................................714 Regular Expressions ........................................................................................................718 More Advanced Text Processing — Discovering Script Dependencies ............................723 Scripts or Fuctions: Checking How a Script was Invoked ................................................727 Summary ..........................................................................................................................728 Part VI: Appendixes Windows Scripting API Appendix A: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .733 XML Elements ..................................................................................................................733 <?XML ?> ................................................................................................................733 <runtime> ..............................................................................................................733 <package> ...............................................................................................................734 <job> ......................................................................................................................734 getResource Static Method ...............................................................................................735 Usage: VBScript ......................................................................................................735 Usage: JScript ..........................................................................................................735 Drives Collection ..............................................................................................................735 Creating: VBScript ..................................................................................................735 Creating: JScript .....................................................................................................736 Properties ...............................................................................................................736 Printers Collection ............................................................................................................736 Creating: VBScript ..................................................................................................736 Creating: JScript .....................................................................................................736 Properties ...............................................................................................................736 StdIn Stream* ...................................................................................................................736 Creating ..................................................................................................................736 Methods ..................................................................................................................736 Properties ...............................................................................................................737 StdErr Stream* .................................................................................................................737 Creating ..................................................................................................................737 Methods ..................................................................................................................737 StdOut Stream* ................................................................................................................737 Creating ..................................................................................................................737 Methods ..................................................................................................................737 WshArguments Collection ...............................................................................................738 Creating ..................................................................................................................738 Methods ..................................................................................................................738 Properties ...............................................................................................................738 86804ftoc.indd xxvi 1/22/09 11:53:41 AM xxvii Contents WshNamed Collection ......................................................................................................738 Creating ..................................................................................................................738 Method ...................................................................................................................738 Properties ...............................................................................................................738 WshUnnamed Collection..................................................................................................738 Creating ..................................................................................................................738 Method ...................................................................................................................739 Properties ...............................................................................................................739 Script.Signer Object..........................................................................................................739 Creating ..................................................................................................................739 Method ...................................................................................................................739 WScript Object .................................................................................................................739 Creating ..................................................................................................................739 Methods ..................................................................................................................739 Properties ...............................................................................................................740 WshController Object .......................................................................................................740 Creating ..................................................................................................................740 Method ...................................................................................................................740 WshEnvironment Object ..................................................................................................740 Creating: VBScript ..................................................................................................740 Creating: JScript .....................................................................................................740 Methods ..................................................................................................................740 Properties ...............................................................................................................741 WshNetwork Object .........................................................................................................741 Creating ..................................................................................................................741 Methods ..................................................................................................................741 Properties ...............................................................................................................741 WshRemote Object ...........................................................................................................742 Creating: VBScript ..................................................................................................742 Creating: JScript .....................................................................................................742 Methods ..................................................................................................................742 Properties ...............................................................................................................742 Events .....................................................................................................................742 WshRemoteError Object ...................................................................................................742 Properties ...............................................................................................................742 WshScriptExec Object ......................................................................................................743 Creating: VBScript ..................................................................................................743 Creating: JScript .....................................................................................................743 Methods ..................................................................................................................743 Properties ...............................................................................................................743 WshShell Object ...............................................................................................................743 Creating ..................................................................................................................743 Methods ..................................................................................................................743 Properties ...............................................................................................................744 86804ftoc.indd xxvii 1/22/09 11:53:41 AM xxviii Contents WshShortcut Object .........................................................................................................744 Creating: VBScript ..................................................................................................744 Creating: JScript .....................................................................................................744 Methods ..................................................................................................................744 Properties ...............................................................................................................744 WshSpecialFolders Object ................................................................................................745 Creating: VBScript ..................................................................................................745 Creating: JScript .....................................................................................................745 Method ...................................................................................................................745 Properties ...............................................................................................................745 WshUrlShortcut Object ....................................................................................................745 Creating: VBScript ..................................................................................................745 Creating: JScript .....................................................................................................745 Methods ..................................................................................................................745 Properties ...............................................................................................................745 Core ADSI Reference Appendix B: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .747 Using This Reference ........................................................................................................747 ADSI Interfaces .................................................................................................................748 IADs .......................................................................................................................748 IADsAcl ..................................................................................................................750 IADsADSystemInfo .................................................................................................751 IADsBackLink ........................................................................................................752 IADsCaseIgnoreList ................................................................................................753 IADsClass ...............................................................................................................753 IADsCollection .......................................................................................................755 IADsComputer........................................................................................................756 IADsComputerOperations ......................................................................................758 IADsContainer ........................................................................................................759 IADsDeleteOps .......................................................................................................760 IADsDomain ...........................................................................................................760 IADsEmail ..............................................................................................................762 IADsExtension ........................................................................................................762 IADsFaxNumber.....................................................................................................762 IADsFileService ......................................................................................................763 IADsFileServiceOperations .....................................................................................763 IADsFileShare .........................................................................................................764 IADsGroup .............................................................................................................765 IADsHold ................................................................................................................766 IADsLargeInteger ....................................................................................................766 IADsLocality ...........................................................................................................767 IADsMembers .........................................................................................................767 IADsNamespaces ....................................................................................................768 IADsNetAddress .....................................................................................................768 IADsO ....................................................................................................................769 86804fto
59.95MB
WEBGL编程指南pdf
2015-09-17基本信息 原书名:WebGL Programming Guide: Interactive 3D Graphics Programming with WebGL (OpenGL) 原出版社: Addison-Wesley Professional 作者: (美)Kouichi Matsuda Rodger Lea(松田浩一,罗杰.李) 译者: 谢光磊 出版社:电子工业出版社 ISBN:9787121229428 上架时间:2014-6-11 出版日期:2014 年6月 开本:16开 页码:470 版次:1-1 --------------------- 目录 《WebGL编程指南》 第1 章 WebGL 概述 1 WebGL 的优势 3 使用文本编辑器开发三维应用 3 轻松发布三维图形程序 4 充分利用浏览器的功能 5 学习和使用WebGL 很简单 5 WebGL 的起源 5 WebGL 程序的结构 6 总结 7 第2 章 WebGL 入门 9 Canvas 是什么? 10 使用[canvas] 标签 11 DrawRectangle.js 13 最短的WebGL 程序:清空绘图区 16 HTML 文件(HelloCanvas.html) 16 JavaScript 程序(HelloCanvas.js) 17 用示例程序做实验 22 绘制一个点(版本1) 22 HelloPoint1.html 24 HelloPoint1.js 24 着色器是什么? 25 使用着色器的WebGL 程序的结构 27 初始化着色器 29 顶点着色器 31 片元着色器 33 绘制操作 34 WebGL 坐标系统 35 用示例程序做实验 37 绘制一个点(版本2) 38 使用attribute 变量 38 示例程序(HelloPoint2.js) 39 获取attribute 变量的存储位置 41 向attribute 变量赋值 42 gl.vertexAttrib3f() 的同族函数 44 用示例程序做实验 45 通过鼠标点击绘点 46 示例程序(ClickedPoints.js) 47 注册事件响应函数 48 响应鼠标点击事件 50 用示例程序做实验 53 改变点的颜色 55 示例程序(ColoredPoints.js) 56 uniform 变量 58 获取uniform 变量的存储地址 59 向uniform 变量赋值 60 gl.uniform4f() 的同族函数 61 总结 62 第3 章 绘制和变换三角形 63 绘制多个点 64 示例程序(MultiPoint.js) 66 使用缓冲区对象 69 创建缓冲区对象(gl.createBuffer()) 70 绑定缓冲区(gl.bindBuffer()) 71 向缓冲区对象中写入数据(gl.bufferData()) 72 类型化数组 74 将缓冲区对象分配给attribute 变量(gl.vertexAttribPointer()) 75 开启attribute 变量(gl.enableVertexAttribArray()) 77 gl.drawArrays() 的第2 个和第3 个参数 78 用示例程序做实验 79 Hello Triangle 80 示例程序(HelloTriangle.js) 80 基本图形 82 用示例程序做实验 83 Hello Rectangle(HelloQuad) 84 用示例程序做实验 85 移动、旋转和缩放 86 平移 87 示例程序(TranslatedTriangle.js) 88 旋转 91 示例程序(RotatedTriangle.js) 93 变换矩阵:旋转 97 变换矩阵:平移 100 4×4 的旋转矩阵 101 示例程序(RotatedTriangle_Matrix.js) 102 平移:相同的策略 105 变换矩阵:缩放 106 总结 108 第4 章 高级变换与动画基础 109 平移,然后旋转 109 矩阵变换库:cuon-matrix.js 110 示例程序(RotatedTriangle_Matrix4.js) 111 复合变换 113 示例程序(RotatedTranslatedTriangle.js) 115 用示例程序做实验 117 动画 118 动画基础 119 示例程序(RotatingTriangle.js) 119 反复调用绘制函数(tick()) 123 按照指定的旋转角度绘制三角形(draw()) 123 请求再次被调用(requestAnimationFrame()) 125 更新旋转角(animate()) .126 用示例程序做实验 128 总结 130 第5 章 颜色与纹理 131 将非坐标数据传入顶点着色器 131 示例程序(MultiAttributeSize.js) 133 创建多个缓冲区对象 134 gl.vertexAttribPointer() 的步进和偏移参数 135 示例程序(MultiAttributeSize_Interleaved.js) 136 修改颜色(varying 变量) 140 示例程序(MultiAttributeColor.js) 141 用示例程序做实验 144 彩色三角形(ColoredTriangle.js) 145 几何形状的装配和光栅化 145 调用片元着色器 149 用示例程序做实验 149 varying 变量的作用和内插过程 151 在矩形表面贴上图像 153 纹理坐标 156 将纹理图像粘贴到几何图形上 156 示例程序(TexturedQuad.js) 157 设置纹理坐标(initVertexBuffers()) 160 配置和加载纹理(initTextures()) 160 为WebGL 配置纹理(loadTexture()) 164 图像Y 轴反转 164 激活纹理单元(gl.activeTexture()) 165 绑定纹理对象(gl.bindTexture()) 166 配置纹理对象的参数(gl.texParameteri()) 168 将纹理图像分配给纹理对象(gl.texImage2D()) 171 将纹理单元传递给片元着色器(gl.uniform1i()) 173 从顶点着色器向片元着色器传输纹理坐标 174 在片元着色器中获取纹理像素颜色(texture2D()) 174 用示例程序做试验 175 使用多幅纹理 177 示例程序(MultiTexture.js) 178 总结 183 第6 章 OpenGL ES 着色器语言(GLSL ES) 185 回顾:基本着色器代码 186 GLSL ES 概述 186 你好,着色器! 187 基础 187 执行次序 187 注释 187 数据值类型(数值和布尔值) 188 变量 188 GLSL ES 是强类型语言 189 基本类型 189 赋值和类型转换 190 运算符 191 矢量和矩阵 192 赋值和构造 193 访问元素 195 运算符 197 结构体 200 赋值和构造 200 访问成员 200 运算符 201 数组 201 取样器(纹理) 202 运算符优先级 203 程序流程控制:分支和循环 203 if 语句和if-else 语句 203 for 语句 204 continue、break 和discard 语句 205 函数 205 规范声明 207 参数限定词 207 内置函数 208 全局变量和局部变量 209 存储限定字 209 const 变量 209 Attribute 变量 210 uniform 变量 211 varying 变量 211 精度限定字 211 预处理指令 213 总结 215 第7 章 进入三维世界 217 立方体由三角形构成 217 视点和视线 218 视点、观察目标点和上方向 219 示例程序(LookAtTriangles.js) 221 LookAtTriangles.js 与RotatedTriangle_Matrix4.js 224 从指定视点观察旋转后的三角形 225 示例程序(LookAtRotatedTriangles.js) 227 用示例程序做实验 228 利用键盘改变视点 230 示例程序(LookAtTrianglesWithKeys.js) 230 独缺一角 232 可视范围(正射类型) 233 可视空间 234 定义盒状可视空间 235 示例程序(OrthoView.html) 236 示例程序(OrthoView.js) 237 JavaScript 修改HTML 元素 239 顶点着色器的执行流程 239 修改near 和far 值 241 补上缺掉的角(LookAtTrianglesWithKeys_ViewVolume.js) 243 用示例程序做实验 245 可视空间(透视投影) 246 定义透视投影可视空间 247 示例程序(perspectiveview.js) 249 投影矩阵的作用 251 共冶一炉(模型矩阵、视图矩阵和投影矩阵) 252 示例程序(PerspectiveView_mvp.js) 254 用示例程序做实验 257 正确处理对象的前后关系 258 隐藏面消除 260 示例程序(DepthBuffer.js) 262 深度冲突 263 立方体 266 通过顶点索引绘制物体 268 示例程序(HelloCube.js) 268 向缓冲区中写入顶点的坐标、颜色与索引 271 为立方体的每个表面指定颜色 274 示例程序(ColoredCube.js) 275 用示例程序做实验 277 总结 279 第8 章 光照 281 光照原理 281 光源类型 283 反射类型 284 平行光下的漫反射 286 根据光线和表面的方向计算入射角 287 法线:表面的朝向 288 示例程序(LightedCube.js) 291 环境光下的漫反射 296 示例程序(LightedCube_ambient.js) 298 运动物体的光照效果 299 魔法矩阵:逆转置矩阵 301 示例程序(LightedTranslatedRotatedCube.js) 302 点光源光 304 示例程序(PointLightedCube.js) 305 更逼真:逐片元光照 308 示例程序(PointLightedCube_perFragment.js) 309 总结 310 第9 章 层次模型 311 多个简单模型组成的复杂模型 311 层次结构模型 313 单关节模型 314 示例程序(JointMode.js) 315 绘制层次模型(draw()) 319 多节点模型 321 示例程序(MultiJointModel.js) 323 绘制部件(drawBox()) 326 绘制部件(drawSegments()) 327 着色器和着色器程序对象:initShaders() 函数的作用 332 创建着色器对象(gl.createShader()) 333 指定着色器对象的代码(gl.shaderSource()) 334 编译着色器(gl.compileShader()) 334 创建程序对象(gl.createProgram()) 336 为程序对象分配着色器对象(gl.attachShader()) 337 连接程序对象(gl.linkProgram()) 337 告知WebGL 系统所使用的程序对象(gl.useProgram()) 339 initShaders() 函数的内部流程 339 总结 342 第10 章 高级技术 343 用鼠标控制物体旋转 343 如何实现物体旋转 344 示例程序(RotateObject.js) 344 选中物体 347 如何实现选中物体 347 示例程序(PickObject.js) 348 选中一个表面 351 示例程序(PickFace.js) 352 HUD(平视显示器) 355 如何实现HUD 355 示例程序(HUD.html) 356 示例程序(HUD.js) 357 在网页上方显示三维物体 359 雾化(大气效果) 359 如何实现雾化 360 示例程序(Fog.js) 361 使用w 分量(Fog_w.js) 363 绘制圆形的点 364 如何实现圆形的点 364 示例程序(RoundedPoint.js) 366 α 混合 367 如何实现α 混合 367 示例程序(LookAtBlendedTriangles.js) 369 混合函数 369 半透明的三维物体(BlendedCube.js) 371 透明与不透明物体共存 372 切换着色器 373 如何实现切换着色器 374 示例程序(ProgramObject.js) 375 渲染到纹理 379 帧缓冲区对象和渲染缓冲区对象 380 如何实现渲染到纹理 381 示例程序(FramebufferObject.js) 382 创建帧缓冲区对象(gl.createFramebuffer()) 385 创建纹理对象并设置其尺寸和参数 385 创建渲染缓冲区对象(gl.createRenderbuffer()) 386 绑定渲染缓冲区并设置其尺寸(gl.bindRenderbuffer(), gl.renderbufferStorage()) 386 将纹理对象关联到帧缓冲区对象(gl.bindFramebuffer(), gl.framebufferTexture2D()) 388 将渲染缓冲区对象关联到帧缓冲区对象(gl.framebufferRenderbuffer()) 389 检查帧缓冲区的配置(gl.checkFramebufferStatus()) 390 在帧缓冲区进行绘图 390 绘制阴影 392 如何实现阴影 392 示例程序(Shadow.js) 393 提高精度 399 示例程序(Shadow_highp.js) 400 加载三维模型 401 OBJ 文件格式 404 MTL 文件格式 405 示例程序(OBJViewer.js) 406 自定义类型对象 409 示例程序(OBJViewer.js 解析数据部分) 411 响应上下文丢失 418 如何响应上下文丢失 419 示例程序(RotatingTriangle_contextLost.js) 420 总结 422 附录A WebGL 中无须交换缓冲区 423 附录B GLSL ES 1.0 内置函数 427 角度和三角函数 428 指数函数 429 通用函数 430 几何函数 433 矩阵函数 434 矢量函数 435 纹理查询函数 436 附录C 投影矩阵 437 正射投影矩阵 437 透视投影矩阵 437 附录D WebGL/OpenGL :左手还是右手坐标系? 439 示例程序(CoordinateSystem.js) 440 隐藏面消除和裁剪坐标系统 443 裁剪坐标系和可视空间 444 什么是对的? 446 总结 448 附录E 逆转置矩阵 449 附录F 从文件中加载着色器 453 附录G 世界坐标系和本地坐标系 . 457 本地坐标系 458 世界坐标系 459 变换与坐标系 461 附录H WebGL 的浏览器设置 . 463
8.6MB
Active Directory Cookbook, 3rd Edition.pdf
2019-07-25Chapter 1, Getting Started Sets the stage for the book by covering where you can find the tools used in the book, VBScript and PowerShell issues to consider, and where to find additional information. Chapter 2, Forests, Domains, and Trusts Covers how to create and remove forests and domains, update
1021KB
Trustworthy Compilers.pdf
2012-12-19This book presented to the readers is my second book published by John Wiley & Sons publishing company — thanks for such a wonderful opportunity to publish! My fi rst Wiley book [1] issued in 2008 covers aspect - oriented programming and its use for trustworthy software development. First, let me explain the allegorical meaning of the picture on the front cover of the book — a view of a rostral column , an architectural monument at the center of St. Petersburg in Neva embankment, designed by Jean - Francois Thomas de Thomon in 1810. When accompanying a compiler development team from Sun around St. Petersburg in 1994, I realized and told my guests that the rostral columns can be considered an allegory of modern compiler architecture. The foundation ( pillar ) of the column symbolizes trustworthy common back - end of a family of compilers for some platform (e.g., Scalable Processor ARChitecture [SPARC ]), and the rostra relying on the column (according to ancient tradition, the rostra should be front parts of the defeated enemy ’ s ships) depicts compiler front - ends — FORTRAN, C, Pascal, Modula, and so on, developed for that hardware platform. This trustworthy compilers book is the result of many years of my professional experience of research and commercial projects in the compiler development fi eld. I was as fortunate as to work with great people and companies on compiler development: in the 1970s to 1980s — with my Russian colleagues on developing compilers for the Russian “ Elbrus ” [2] supercomputers; in the 1990s — with Sun Microsystems on developing Sun compilers; and since 2003 — with Microsoft on its Phoenix [3] technology for compiler development. The results of these collaborations are presented in my book.
40.44MB
Microsoft Windows 7 In Depth.pdf
2019-08-21Thank you for purchasing or considering the purchase of Windows 7 In Depth. It’s amazing the changes that 20-odd years can bring to a com- puter product such as Windows. When we wrote our first Windows book back in the mid-1980s, our publisher didn’t even think the book would sell well enough to print more than 5,000 copies. Microsoft stock wasn’t even a blip on most investors’ radar screens. Boy, were they in the dark! Who could have imagined that a little more than a decade later, anyone who hoped to get hired for even a temp job in a small office would need to know how to use Microsoft Windows, Office, and a PC. Fifteen or so Windows books later, we’re still finding new and excit- ing stuff to share with our readers. Who could have imagined in 1985 that a mass-market operating system two decades later would have to include support for so many technolo- gies, most of which didn’t even exist at the time: DVD, DVD±RW, CD-R and CD-RW, Internet and intranet, MP3, MPEG, WMA, DV, USB, FireWire, APM, ACPI, RAID, UPS, PPOE, Gigabit Ethernet, 802.11g, WPA2, IPv6, Teredo, speech recognition, touch and pen interfaces, fault tolerance, disk encryption and compression…? The list goes on. And that 8GB of disk space Windows 7 occupies? It would have cost about half a million dollars in 1985. Today, it costs less than a dollar. In 1981, when we were building our first computers, the operating sys- tem (CP/M) had to be modified in assembly language and recompiled, and hardware parts had to be soldered together to make almost any new addition (such as a video display terminal) work. Virtually nothing was standardized, with the end result being that computers remained out of reach for average folks. Together, Microsoft, Intel, and IBM changed all that. Today you can pur- chase a computer, a printer, a scanner, an external disk drive, a key- board, a modem, a monitor, and a video card over the Internet, plug Introduction From the Library of Lee Bogdanoff Introduction them in, install Windows, and they’ll work together. The creation and adoption (and sometimes forcing) of hardware and software standards that have made the PC a household appliance the world over can largely be credited to Microsoft, like it or not. The unifying glue of this PC revolution has been Windows. Yes, we all love to hate Windows, but it’s here to stay. Linux and Mac OS X are formidable alterna- tives, but for most of us, at least for some time, Windows and Windows applications are “where it’s at.” And Windows 7 ushers in truly significant changes to the landscape. That’s why we were excited to write this book. Why This Book? We all know this book will make an effective doorstop in a few years. You probably have a few already. (We’ve even written a few!) If you think it contains more information than you need, just remember how helpful a good reference can be when you need it at the 11th hour. And we all know that computer technology changes so fast that it’s sometimes easier just to blink and ignore a phase than to study up on it. Windows 7 is definitely a significant upgrade in Windows’ security and sophistication—one you’re going to need to understand. If you’re moving up to Windows 7 from Windows XP, you should know that Windows 7 is a very dif- ferent animal. Yes, the graphics and display elements are flashier, but it’s the deeper changes that matter most. With its radically improved security systems, revamped Control Panel, friendlier net- work setup tools, new problem-tracking systems, improved power management and usability tools for mobile computers, and completely revamped networking and graphics software infrastructures, Windows 7 leaves XP in the dust. And if you’re moving up from Vista, you’ll be very pleasantly surprised at the improvements. Vista got a bad rap, perhaps for some good reasons: It was slow, required too much RAM, had driver issues, and annoyed users with its User Account Control prompts. Windows 7 fixes all of that, thank goodness! Think of Windows 7 as Vista after three years at a spa/reform school. It’s leaner, stronger, more refined, and ever so polite. In all ways, Windows 7 is superior to any operating sys- tem Microsoft has ever produced. Is Windows 7 so easy to use that books are unnecessary? Unfortunately, no. True, as with other releases of Windows, online help is available. As has been the case ever since Windows 95, how- ever, no printed documentation is available (to save Microsoft the cost), and the Help files are writ- ten by Microsoft employees and contractors. You won’t find criticisms, complaints, workarounds, or suggestions that you use alternative software vendors, let alone explanations of whyyou have to do things a certain way. For that, you need this book! We will even show you tools and techniques that Microsoft’s insiders didn’t think were important enough to document at all. You might know that Windows 7 comes in a bewildering array of versions: primarily Home Premium, Professional, Enterprise, and Ultimate (not to mention Starter, intended for relatively primitive “netbook” computers and emerging markets; Home Basic, sold only in emerging markets; and several extra versions sold in the European Union to comply with antitrust court-mandated restrictions). But Windows 7 is Windows 7, and all that really distinguishes the versions is the availability of various features. Mostof the differences matter only in the corporate world, where Windows 7 will be managed by network administrators, so most corporate users won’t need to 2 From the Library of Lee Bogdanoff 3 Why This Book? worry about them. For the remaining features, we tell you when certain features do or don’t apply to your particular version of Windows 7. (And we show you how to upgrade from one version to a better version, if you want the features your copy doesn’t have!) In this book’s many pages, we focus not just on the gee-whiz side of the technology, but why you should care, what you can get from it, and what you can forget about. The lead author on this book has previously written 17 books about Windows, all in plain English (several bestsellers), designed for everyone from rank beginners to full-on system administrators deploying NT Server domains. The coauthor has designed software and networks for more than 20 years and has been writing about Windows for 10 years. We work with and write about various versions of Windows year in and year out. We have a clear understanding of what confuses users and system administrators about installing, configuring, or using Windows, as well as (we hope) how to best convey the solu- tions to our readers. While writing this book, we tried to stay vigilant in following four cardinal rules: •Keep it practical. •Keep it accurate. •Keep it concise. •Keep it interesting, and even crack a joke or two. We believe that you will find this to be the best and most comprehensive book available on Windows 7 for intermediate through advanced users. And whether you use Windows 7 yourself or support others who do, we firmly believe this book will address your questions and needs. Our book addresses both home and business computer users. We assume you probably are not an engineer, and we do our best to speak in plain English and not snow you with unexplained jargon. As we wrote, we imagined that you, our reader, are a friend or co-worker who’s familiar enough with your computer to know what it’s capable of, but might not know the details of how to make it all happen. So we show you, in a helpful, friendly, professional tone. In the process, we also hope to show you things that you might not have known, which will help make your life easier—your com- puting life, anyway. We spent months and months poking into Windows 7’s darker corners so you wouldn’t have to. And, if you’re looking for power-user tips and some nitty-gritty details, we make sure you get those, too. We try to make clear what information is essential for you to understand and what is optional for just those of you who are especially interested. We’re also willing to tell you what we don’t cover. No book can do it all. As the title implies, this book is about Windows 7. We don’t cover setting up the Server versions of this operating system, called Windows 2000 Server, Windows Server 2003, and Windows Server 2008. However, we do tell you how to connect to and interact with these servers, and even other operating systems, including Mac OS X, Linux, and older variants of Windows, over a local area network. Because of space limitations, there is only one chapter devoted to coverage of Windows 7’s numer- ous command-line utilities, its batch file language, Windows Script Host, and Windows PowerShell. For that (in spades!), you might want to check Brian’s book Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools, which is due to be published in the fall of 2009. From the Library of Lee Bogdanoff Introduction Even when you’ve become a Windows 7 pro, we think you’ll find this book to be a valuable source of reference information in the future. Both the table of contents and the very complete index will provide easy means for locating information when you need it quickly. How Our Book Is Organized Although this book advances logically from beginning to end, it’s written so that you can jump in at any location, quickly get the information you need, and get out. You don’t have to read it from start to finish, nor do you need to work through complex tutorials. This book is broken down into seven major parts. Here’s the skinny on each one: Part I, “Getting Started with Windows 7,” introduces Windows 7’s new and improved features and shows you how to install Windows 7 on a new computer or upgrade an older version of Windows to Windows 7. It also shows you how to apply service packs to keep your version of Windows 7 up-to- date. Finally, we take you on a one-hour guided tour that shows you the best of Windows 7’s fea- tures and walks you through making essential settings and adjustments that will help you get the most out of your computer. In Part II, “Using Windows 7,” we cover the core parts of Windows 7, the parts you’ll use no matter what else you do with your computer: managing documents and files, using the Windows desktop, starting and stopping applications, searching through your computer’s contents, printing, and using the desktop gadgets and other supplied accessories. Don’t skip this section, even—or rather, espe- cially—if you’ve used previous versions of Windows. Windows 7 does many things differently, and you’ll want to see how to take advantage of it! Windows 7 has great tools for viewing, playing, creating, editing, and managing music, movies, and pictures. In Part III, “Multimedia and Imaging,” we show you how to use the new Windows Media Player, burn CDs, extract and edit images from cameras and scanners, send faxes, and create DVDs. Finally, we show you how to use Windows Media Center, which lets you view all that stuff and, on a properly equipped computer, record and play back your favorite TV shows. We even show you how to burn DVDs from your recorded shows and discuss compression options for storage consider- ations and format options for playback on other devices. In Part IV, “Windows 7 and the Internet,” we first help you set up an Internet connection and then move on to explain Windows 7’s Internet tools. We provide in-depth coverage of the new and improved (and safer!) Internet Explorer. The final chapter shows you how to diagnose Internet con- nection problems. Networks used to be found only in high-falutin’ offices and corporate settings. Now, any home or office with two or more computers should have a network. A LAN is inexpensive, and with one you can share an Internet connection, copy and back up files, and use any printer from any computer. In Part V, “Networking,” we walk you through setting up a network in your home or office, and show you how to take advantage of it in day-to-day use. We also show you how easy it is to share a DSL or cable Internet connection with all your computers at once, show you how to network with other operating systems, and, finally, help you fix it when it all stops working. Part VI, “Maintaining Windows 7,” covers system configuration and maintenance. We tell you how to work with the Control Panel and System Administration tools, provide tips and tricks for cus- tomizing the graphical user interface to maximize efficiency, explain how to manage your hard disk 4 From the Library of Lee Bogdanoff 5 Conventions Used in This Book and other hardware, and describe a variety of ways to upgrade your hardware and software (includ- ing third-party programs) for maximum performance. We show you how to troubleshoot hardware and software problems, edit the Windows Registry, and, for real power users, how to use and tweak the command-line interface. When Windows was introduced over two decades ago, computer viruses, online fraud, and hacking were only starting to emerge as threats. Today (thanks in great part to gapingsecurity holes in pre- vious versions of Windows), computer threats are a worldwide problem, online and offline. In Part VII, “Security,” we provide a 360-degree view of Windows 7’s substantial improvements in security. Here you’ll find out both what Windows 7 will do to help you, and what you must do for yourself. We cover protection against viruses and spyware, loss and theft, hackers and snoops, and fraud and spam—in that order. Part VIII, “Windows On the Move,” shows you how to get the most out of Windows 7 when either you or your computer, or both, are on the go. We show you how to use wireless networking safely, how to get the most out of your laptop, and how to connect to remote networks. We also show you how to use Remote Desktop to reach and use your own computer from anywhere in the world. We finish up with a chapter about the cutting edge in laptops and desktops—pen and touch computing using the Tablet-PC features of Windows 7. Appendix A, “Using Virtualization on Windows 7,” explains how to use a newly released, free ver- sion of the Microsoft Virtual PC program to run older XP programs under Windows 7. For some users, this can be an excellent alternative to creating a dual-boot system with XP and Windows 7.
59.47MB
[完整][Oracle][Oracle数据库精讲与疑难解析].pdf
2012-11-17[完整][Oracle][Oracle数据库精讲与疑难解析].pdf 作 者:赵振平 编著 出 版 社:电子工业出版社 出版时间:2008-5-1 版 次:1页 数:932字 数:1196000印刷时间:2008-5-1开 本:16开纸 张:胶版纸印 次:1I S B N:9787121061899 内容简介 本书是一本毫无保留的Oracle学习宝典。通过作者历时3年的写作,本书介绍了Oracle的安装及卸载、数据库的启动关闭、表空间和数据文件的管理、Oracle网络管理、口令文件管理、内存管理、进程管理、用户管理、数据的导入导出、备份与恢复、模式对象的管理以及应用程序开发等相关知识。本书旨在向读者解答使用Oracle中遇到的疑难问题,并展示管理Oracle的大量技巧。 目录 第1篇 创建属于自己的Oracle数据库 第1章 认识Oracle的世界——Oracle的体系结构 1.1 Oracle的发家史 1.2 数据库 1.3 数据库管理系统(DBMS) 1.4 关系数据库的概念(RDBMS) 1.4.1 关系数据库模型 1.4.2 表 1.5 Oracle的总体框架结构 1.5.1 Oracle实例(Oracle Instance) 1.5.2 Oracle的存储结构 1.6 数据字典(Data Dictionary) 1.6.1 数据字典概述 1.6.2 数据字典的结构 1.6.3 数据字典的使用 第2章 迈出第1步——Oracle的安装/卸载 2.1 Oracle的安装 2.1.1 Oracle安装的几个概念 2.1.2 Oracle g(10.1)的安装——Windows篇 2.1.3 Oracle g的安装——Solaris篇 2.1.4 Oracle安装疑难解析 2.2 Oracle的卸载 2.2.1 Oracle完全卸载——Windows篇 2.2.2 Oracle完全卸载——UNIX篇 第3章 有米之炊——数据库的创建与删除 3.1 创建数据库 3.1.1 数据库创建概述 3.1.2 Solaris下用DBCA创建数据库 3.1.3 DIY——Solaris下手工创建数据库 3.1.4 数据库创建疑难解析 3.2 删除数据库 3.2.1 数据库删除概述 3.2.2 数据库删除——手工篇 3.2.3 数据库删除——DBCA篇 第2篇 网 络 管 理 第4章 Oracle网络管理并不难 4.1 Oracle网络体系结构 4.1.1 Oracle应用的几种网络结构 4.1.2 Oracle Net 4.1.3 OSI模型 4.1.4 Oracle Net的堆栈结构 4.1.5 Oracle监听器 4.1.6 连接描述符(connect identifier) 4.1.7 网络服务名(Net Service Name) 4.1.8 命名方法 4.1.9 配置Oracle网络的工具 4.2 Oracle网络管理 4.2.1 Oracle网络服务器端配置 4.2.2 Oracle网络客户端配置 4.3 Oracle网络管理疑难解析 4.3.1 Oracle网络服务器端配置疑难解析 4.3.2 Oracle网络客户端配置疑难解析 4.3.3 Oracle网络与防火墙(Firewall) 第3篇 系 统 管 理 第5章 系统管家婆——SQL*Plus的使用 5.1 系统管理工具SQL*Plus 5.2 SQL缓冲区(SQL Buffer) 5.3 SQL*Plus的环境配置 5.3.1 SQL*Plus的环境变量 5.3.2 SQL*Plus站点配置文件(Site Profile) 5.3.3 SQL*Plus用户配置文件(User Profile) 5.4 SQL*Plus的启动 5.5 SQL*Plus专有命令介绍 5.5.1 登录,注销命令 5.5.2 编辑命令 5.5.3 其他有用的SQL*Plus命令 5.6 SQL*Plus 与疑难解析 第6章 有始有终——数据库的启动与关闭 6.1 数据库启动 6.1.1 数据库启动原理 6.1.2 数据库启动 6.1.3 数据库启动疑难解析 6.2 数据库关闭 6.2.1 数据库关闭原理 6.2.2 数据库的关闭(SHUTDOWN) 6.2.3 数据库关闭疑难解析 第7章 理清两个模式问题——专有/共享服务器模式 7.1 理解专有服务器模式(Dedicated Server Mode) 7.2 共享服务器模式(Shared Server Mode)原理 7.2.1 共享服务器模式(Shared Server Mode)的架构 7.2.2 监听器和调度进程的关系 7.2.3 请求队列(Request Queue)/响应队列(Response Queue) 7.2.4 调度进程(Dispatcher Processes,Dnnn) 7.2.5 共享服务器进程(Shared Server Processes,Snnn) 7.3 共享服务器模式(Shared Server Mode) 7.4 共享服务器模式(Shared Server Mode)疑难解析 第8章 掌握两个管理问题——表空间和数据文件的管理 8.1 数据库存储结构 8.1.1 物理结构 8.1.2 逻辑结构 8.2 深刻理解表空间 8.2.1 大文件表空间 8.2.2 系统表空间 8.2.3 辅助表空间 8.2.4 回滚表空间(Undo Tablespace) 8.2.5 临时表空间 8.2.6 表空间中区的管理方式 8.2.7 表空间中段的管理方式 8.2.8 非标准块表空间 8.2.9 表空间的离线(Offline)与在线(Online) 8.2.10 只读表空间(Read-Only Tablespace) 8.3 深刻理解数据文件 8.3.1 数据文件的内容 8.3.2 数据文件的尺寸(Size) 8.3.3 离线数据文件 8.3.4 临时数据文件(Temporary Datafiles) 8.4 表空间管理 与疑难解析 8.4.1 永久表空间管理 8.4.2 临时表空间管理 与疑难解析 8.4.3 回滚表空间管理 与疑难解析 8.5 数据文件管理 与疑难解析 8.5.1 数据文件管理 8.5.2 数据文件管理疑难解析 第9章 进程管理 9.1 Oracle进程简介 9.2 用户进程 9.3 Oracle进程 9.3.1 服务器进程 9.3.2 后台进程 9.4 进程综合管理 与疑难解析 9.5 会话管理 与疑难解析 第10章 内存管理 10.1 Oracle内存结构简介 10.2 系统全局区 10.3 SGA自动管理 10.4 SGA组成介绍 10.4.1 数据库高速缓冲区 10.4.2 日志缓冲区 10.4.3 共享池 10.4.4 大池 10.4.5 Java池 10.4.6 流池 10.5 程序全局区 10.6 内存管理 与疑难解析 第11章 用户管理 11.1 用户验证 11.1.1 口令认证 11.1.2 外部认证 11.1.3 全局认证 11.2 Oracle的安全大门——权限(Privileges) 11.2.1 系统权限 11.2.2 对象权限 11.3 使权限管理变得更加容易——角色(Role) 11.4 限制用户的资源消耗——资源限制文件(Profile) 11.4.1 资源限制的级别 11.4.2 限制资源的参数 11.5 用户与权限管理 与疑难解析 11.5.1 用户管理 与疑难解析 11.5.2 权限管理 与疑难解析 11.5.3 角色管理 与疑难解析 11.5.4 资源限制文件管理 与疑难解析 第4篇 移动你的数据库 第12章 数据导出 12.1 数据导出方法介绍 12.1.1 Oracle最新导出工具——Data Pump Export 12.1.2 Oracle原来的导出工具——Export 12.2 数据导出 12.3 数据导出疑难解析 第13章 数据导入 13.1 数据导入方法介绍 13.1.1 Oracle最新导入工具——Data Pump Import 13.1.2 Oracle以前的导入方法——Import 13.2 数据导入 13.3 数据导入疑难解析 第5篇 Oracle文件管理 第14章 重中之重——控制文件的管理 14.1 控制文件的概念 14.2 控制文件管理 与疑难解析 第15章 成为数据库的最高统治者——口令文件(Password File)管理 15.1 超级用户权限(SYSDBA、SYSOPER)介绍 15.2 口令文件的基本概念 15.3 启用口令文件认证 15.4 口令文件管理 与疑难解析 第16章 联机日志文件管理 16.1 联机日志文件的概念 16.1.1 联机日志文件的内容 16.1.2 联机日志文件的循环利用 16.2 联机日志文件管理 与疑难解析 第17章 参数文件(PFILE/SPFILE)管理 17.1 参数文件的基本概念 17.2 初始化参数文件 17.3 服务器参数文件 17.4 初始化参数的修改 17.5 参数管理 与疑难解析 第6篇 Oracle高级专题 第18章 全球应用——分布式数据库疑难攻略 18.1 分布式数据库系统的概念 18.1.1 同构分布式数据库系统 18.1.2 异构分布式数据库系统 18.1.3 数据库链接(Database Link) 18.2 分布式数据库管理 与疑难解析 第19章 并不陌生的问题——裸设备 19.1 裸设备的概念 19.2 裸设备管理 与疑难解析 第7篇 数据库备份/恢复 第20章 备份/恢复之基石——归档(Archivelog)管理 20.1 归档的基本概念 20.1.1 非归档模式 20.1.2 归档模式 20.1.3 归档路径 20.2 归档管理 与疑难解析 第21章 必行之举——数据库备份 21.1 理解数据库备份 21.1.1 数据库失败的种类 21.1.2 备份和恢复的解决方案 21.1.3 备份和恢复的物理结构 21.1.4 备份的类型 21.1.5 执行用户管理的备份 21.2 恢复管理器(RMAN) 21.2.1 通道 21.2.2 备份集的维护 21.2.3 RMAN资料库 21.2.4 RMAN的使用 21.3 数据库备份 与疑难解析 21.4 恢复目录管理 与疑难解析 第22章 失而复得——数据库恢复 22.1 数据库恢复 22.1.1 实例恢复 22.1.2 介质恢复 22.1.3 用户错误(User Error)的恢复 22.2 数据库闪回(Flashback Database) 22.3 用户管理的恢复(User-managed Recovery) 22.4 联机日志文件丢失的恢复 22.5 控制文件损坏的恢复 22.6 数据文件损坏的恢复 22.7 表的恢复(用户错误的恢复) 第8篇 Oracle程序设计 第23章 数据库通用语言——SQL语句 23.1 结构化查询语言简介 23.2 SELECT语句 23.2.1 理解SELECT 语句 23.2.2 SELECT语句使用 与疑难解析 23.3 INSERT语句 23.3.1 理解INSERT语句 23.3.2 INSERT语句使用 与疑难解析 23.4 UPDATE语句 23.4.1 理解UPDATE语句 23.4.2 UPDATE语句使用 与疑难解析 23.5 DELETE语句 23.5.1 理解DELETE语句 23.5.2 DELETE语句的使用 23.6 SQL语句中,集合函数使用 与疑难解析 第24章 模式对象(Schema Object)的管理 24.1 模式(Schema)的概念 24.2 模式对象管理 24.2.1 表(Table) 24.2.2 索引(Index) 24.2.3 外部表(External Table) 24.2.4 临时表(Temporary Table) 24.2.5 分区表(Partition Table) 24.2.6 聚簇(Cluster) 24.2.7 索引组织表(Index-Organized Table,IOT) 24.2.8 视图 24.2.9 同义词 24.2.10 序列 第25章 PL/SQL应用程序开发 25.1 PL/SQL简述 25.1.1 PL/SQL块结构 25.1.2 数据类型 25.1.3 运算符 25.1.4 PL/SQL语句控制结构 25.2 存储过程(Stored Procedure) 25.2.1 存储过程的基本原理 25.2.2 存储过程管理 与疑难解析 25.3 函数(Function) 25.3.1 函数的基本原理 25.3.2 函数的管理 与疑难解析 25.4 包 25.4.1 包的基本原理 25.4.2 包管理 与疑难解析 25.5 触发器 25.5.1 触发器的基本原理 25.5.2 触发器管理 与疑难解析 25.6 游标 25.6.1 游标的基本原理 25.6.2 游标管理 与疑难解析 速查目录 第2章 迈出第1步——Oracle的安装/卸载 实务1 安装Oracle时,为什么不能启动安装界面 实务2 为什么Oracle安装界面无法显示中文,都是“□□□” 实务3 安装Oracle时,报告错误“ORA-12547:TNS:lost contact” 实务 实务4 如何下载Oracle的安装文件 实务5 Oracle安装完成后,用户sys与system默认的密码是什么 实务 实务6 如何找到Oracle安装时生成的日志文件 实务7 安装Oracle时,是否需要安装JDK 实务8 解压安装文件时,报告无权限 实务 实务9 安装Oracle软件并创建完数据库后,服务内的ORACLESID显示 实务9 “启动”而不是“已启动” 实务10 安装Oracle时,报告错误“Thrown when the IP address of a host 实务10 cannot be determined” 实务11 安装Oracle时,报告错误“无法读取C:/Program Files/Oracle/ 实务11 Inventory/ ContentsXML/ comps.xml,丢失某些产品清单信息” 实务12 安装时,提示“安装程序交换区C:\Documents and Settings\ 实务12 Administrator\Local Settings\Temp\OraInstall没有足够的磁盘空间, 实务12 请再装备一些磁盘空间,然后再试” 实务 实务13 创建数据库时,出现错误“ORA-03113: end-of-file on 实务13 communication channel” 实务14 安装Oracle时,报告错误“ORA-27102:out of memory” 实务15 在Linux(UNIX)环境下成功安装了Oracle g,从Windows 实务15 下用IE登录Oracle g的em时,按钮显示为“□□” 实务 实务16 在Linux AS4安装Oracle i(9.2.X.X),当执行runInstaller时,出现错误 实务17 是否可以在同一机器上既装Oracle i又装Oracle i 实务 实务18 安装Oracle i时,遇到错误“invalid end header format” 实务 实务19 在同一台机器上同时安装Oracle i与Oracle g 实务20 安装Oracle时,报告错误“ORA-27123:unable to attach to shared 实务20 memory segment”。 实务 实务21 安装Oracle时,报告错误,不能够写/tmp目录 实务 实务22 安装Oracle g时,报告操作系统版本(operating system version) 实务22 检查失败之案例一 实务 实务23 在安装Oracle g时,报告补丁包(Service Pack)检查失败 实务 实务24 安装Oracle时,报告显示器(monitor)设置检查失败 实务25 Oracle安装完成以后,为什么在提示符下输入sqlplus,提示命令不存在 实务26 安装Oracle时,报告打开共享对象文件libawt.so:libXp.so.6错误 实务 实务27 安装Oracle时,报告错误“…cannot restore segment prot after reloc: 实务27 Permission denied” 实务 实务28 安装Oracle时,报告错误“…libaio.so.1: cannot open shared object file” 实务 实务29 在Windows上安装Oracle,临时目录的空间充足,却报告不能够 实务29 写临时目录 实务30 安装Oracle到一定进度时,报告错误“加载数据库时出错:areasQueries” 实务31 Oracle i在奔腾4(P4)机器上安装的异常处理 实务32 安装Oracle时,报告先决条件检查失败 实务33 如何标识已经存在的Oracle根目录(Oracle Base Directory) 实务 实务34 如何标识已经存在的Oracle清单目录(Oracle Inventory Director) 实务35 如何标识已经存在的Oracle主目录(Oracle Home Directory) 实务 第3章 有米之炊——数据库的创建与删除 实务36 使用DBCA创建数据库时,报告错误“ORA-12547: TNS: lost contact” 实务 实务37 使用DBCA创建数据库时,报告错误“ORA-12571: TNS:packet writer failure” 实务38 使用DBCA创建数据库时,报告错误“ORA-27123: unable to attach to shared memory segment” 实务39 手工创建数据库时,如何查找数据库创建失败的原因 实务40 手工创建数据库时,报告错误“ORA-01504: database name 'TT' does not match parameter db_name 'man'” 实务41 手工创建数据库,启动实例时,报告错误“ORA-24324: service handle not initialized” 实务42 手工创建数据库时,报告错误“ORA-27038: created file already exists” 实务 实务43 手工创建数据库时,报告错误“ORA-01100: database already mounted” 实务44 手工重建数据库时,报告错误“ORA-01092: ORACLE instance terminated. Disconnection forced”之案例一 实务 实务45 手工重建数据库时,报告错误“ORA-01092: ORACLE instance terminated. Disconnection forced”之案例二 实务 实务46 手工重建数据库时,报告错误“ORA-01092: ORACLE instanceterminated. Disconnection forced”之案例三 实务47 手工创建数据库时,报告错误“ORA-01034: ORACLE not available” 实务48 手工创建数据库,启动实例时,后台进程启动失败(如ORA-00444:background process "LGWR" failed while starting) 实务49 手工创建数据库,启动实例时,报告参数user_dump_dest错误 第4章 Oracle网络管理并不难 实务50 启动监听器时,报告错误“无法找到指定的路径” 实务 实务51 连接数据库时,报告错误“TNS-12541:TNS:no listener”(没有监听器)之案例一 实务52 连接数据库时,报告错误“TNS-12541:TNS:no listener”(没有监听器)之案例二 实务53 连接数据库时,报告错误“TNS-12541:TNS:no listener”(没有监听器)之案例三 实务54 如何修改监听器的端口号 实务55 启动监听器时,报告错误“TNS-12545:Connect failed because target host or object does not exist”案例一 实务 实务56 启动监听器时,报告错误“TNS-12545:Connect failed because target host or object does not exist”案例二 实务 实务57 客户端连接数据库时,报告权限不足(ORA-01031:insufficient privileges) 实务58 以SYSDBA的身份登录数据库,报告错误“ORA-12518:TNS:listener could not hand off client connection” 实务 实务59 连接数据库时,报告错误“TNS-12538:TNS:no such protocol adapter” 实务60 如何禁止以操作系统认证方式登录Oracle 实务 实务61 连接数据库时,报告错误“ORA-12505: TNS:listener does not currently know of SID given in connect descriptor” 实务62 连接数据库时,报告错误“TNS-03505 Failed to resolve name”(无法解析服务名)之案例一 实务63 连接数据库时,报告错误“TNS-03505:Failed to resolve name”(无法解析服务名)之案例二 实务64 连接数据库时,报告错误“TNS-03505:Failed to resolve name”(无法解析服务名)之案例三 实务65 连接数据库时,报告错误“TNS-03505:Failed to resolve name”(无法解析服务名)之案例四 实务66 连接数据库时,报告错误“TNS-12535:TNS:operation timed out”之案例一 实务 实务67 连接数据库时,报告错误“TNS-12533:TNS:illegal ADDRESS parameters” 实务68 连接数据库时,报告错误“TNS-12504:TNS:listener was not given the SID in CONNECT_DATA” 实务69 协议适配器错误(ORA-12560: TNS:protocol adapter error)之案例一 实务70 协议适配器错误(ORA-12560: TNS:protocol adapter error)之案例二 实务71 连接数据库时,报告错误“ORA-03113: end-of-file on communication channel,ORA-24315: illegal attribute type” 实务 实务72 连接数据时,报告错误“ORA-12545:Connect failed because target host or object does not exist”之案例三 实务 实务73 连接数据库时,报告错误“ORA-12154: TNS:could not resolve the connect identifier specified” 实务74 连接数据库时,报告错误“ORA-12162: TNS:net service name is incorrectly specified” 实务75 连接数据库时,报告错误“ORA-12514: TNS:listener does not currently know of service” 实务76 连接数据库时,报告错误“ORA-12523: TNS:listener could not find instance appropriate for the client connection” 实务77 连接数据库时,报告错误“ORA-12520: TNS:listener could not find available handler for requested type of server” 实务 实务78 连接数据库时,报告错误“ORA-12170: TNS:Connect timeout occurred” 实务79 连接数据库时,报告错误“TNS-12535:TNS:operation timed out”之案例二 实务 实务80 连接数据库时,报告错误“ORA-12537: TNS:connection closed” 实务 第5章 系统管家婆——SQL*Plus的使用 实务 实务81 如何定义绑定变量(Bind Variables) 实务82 使用SQL*Plus,如何登录数据库 实务83 如何在SQL*Plus中执行SQL语句 实务84 如何把SQL*Plus设置成自动提交模式(AUTOCOMMIT) 实务85 在SQL*Plus中,如何终止SQL语句的执行 实务86 如何在SQL*Plus中执行操作系统命令(OS COMMANDS) 实务 实务87 在SQL*Plus中,如何执行一段PL/SQL块(PL/SQL Blocks) 实务88 如何在SQL*Plus中执行存储过程 实务89 如何重复执行一条SQL语句 实务90 如何在启动SQL*Plus时,不出现登录界面 实务91 如何修改Oracle日期显示格式 实务92 如何把SQL缓冲区的内容保存到操作系统文件中 实务93 如何编辑缓冲区中的SQL语句 实务94 如何运行一个SQL脚本文件 实务95 如何将查询结果保存到文件中 实务96 如何知道SQL语句的执行速度 实务97 如何查看SQL*Plus的系统变量 实务98 如何设置SQL*Plus的系统变量 实务99 如何改变SQL*Plus的启动选项 实务100 如何关闭SQL*Plus 实务101 如何禁止用户在SQL*Plus中执行指定命令 实务102 如何列出SQL缓冲区中的内容 实务 实务103 如何把SQL脚本文件的内容装载到SQL*Plus的缓冲区中 实务104 如何查出SQL*Plus默认使用哪个编辑器(editor) 实务105 如何设置SQL*Plus默认使用哪个编辑器(editor) 实务106 如何把SQL*Plus所有环境变量的设置保存到操作系统文件中 实务107 在SQL*Plus中,为什么无法显示小时 实务108 为什么SQL语句的返回结果非常零乱 第6章 有始有终——数据库的启动与关闭 实务109 如何使数据库自动启动/关闭之UNIX/Linux篇 实务 实务110 如何使数据库自动启动/关闭之Windows篇 实务111 如何把数据库启动到NOMOUNT状态 实务112 如何把数据库启动到MOUNT状态 实务113 如何打开数据库(Open) 实务114 如何一步一步启动数据库 实务115 如何用特定的初始化参数文件(Initialization Parameter File,FILE)启动数据库 实务116 如何把数据库启动到限制模式(RESTRICT) 实务 实务117 如何以只读模式(Read Only)打开数据库 实务118 如何把数据库启动到恢复模式(RECOVER) 实务 实务119 如何重新启动数据库(RESET) 实务120 启动数据库时,报告错误“LRM-00123: invalid character found in the input file” 实务121 启动数据库时,报告“权限不足”(ORA-01031: insufficient privileges) 实务122 启动数据库时,报告错误“ORA-07217: sltln: environment variable cannot be evaluated” 实务 实务123 连接数据库时,提示错误“ORA-27101: shared memory realm does not exist” 实务 实务124 启动数据库时,报告错误“ORA-00600:internal error code,arguments: [num],[?],[?],[?],[?] ” 实务125 如何判断数据库是否已经启动 实务126 如何知道数据库处于何种状态 实务127 打开数据库时,报告错误“ORA-01507: database not Mounted” 实务 实务128 启动数据库时,报告错误“未知参数名”(LRM-00101: unknownsarameter name 'ss') 实务129 启动数据库时,报告错误“不能打开参数文件”(ORA-01078: failure in processing system parameters) 实务 实务130 启动数据库时,报告错误“LRM-00116: syntax error at 'DB_BLOCK_SIZE' following '='” 实务131 启动数据库时,报告错误“ORA-24323: value not allowed” 实务 实务132 启动数据库时,报告错误“标识控制文件时,发生错误”(ORA-00205: error in identifying control file, check alert log for more info) 实务 实务133 启动数据时,报告错误“ORA-00381: cannot use both new and old parameters for buffer cache size specification” 实务134 启动数据库时,报告错误“数据库已经运行”(ORA-01081: cannot start already-running ORACLE - shut it down first) 实务 实务135 启动数据库时,报告错误“ORA-19809: limit exceeded for recovery file” 实务136 启动数据库时,数据库被挂起之案例一 实务137 启动数据库时,数据库被挂起之案例二 实务138 启动数据库时,数据库被挂起之案例三 实务139 启动数据库时,报告错误“ORA-10997: another STARTUP/SHUTDOWN operation of this instance inprogress” 实务140 启动数据库时,报告错误“ORA-02778: Name given for the log directory is invalid” 实务 实务141 启动数据库时,报告错误“ORA-01565: error in identifying file 'E:\oracle\ product\10.2.0\db_1/dbs/SPFILEWM.ora'” 实务142 启动数据时,报告错误“ORA-27046: file size is not a multiple of logical block size” 实务143 启动数据库时,报告错误“ORA-00106: cannot STARTUP/SHUTDOWN database when connected to a dispatcher” 实务144 如何以NORMAL方式关闭数据库 实务145 如何以IMMEDIATE方式关闭数据库 实务146 如何以TRANSACTIONAL方式关闭数据库 实务147 如何以ABORT方式关闭数据库 实务 实务148 为什么关闭数据库如此慢 实务149 连接数据库时,报告错误“ORA-01090: SHUTDOWN in progress - connection is not permitted” 实务150 登录数据库时,报告错误“ORA-01033: Oracle initialization or shutdown in progress” 实务151 为什么使用SHUTDOWN IMMEDIATE命令不能关闭数据库 实务 第7章 理清两个模式问题——专有/共享服务器模式 实务152 如何把数据库配置成共享服务器模式(Shared Server)之手工篇 实务 实务153 如何把数据库配置成共享服务器模式(Shared Server)之DBCA篇 实务154 数据库已经被配置成共享服务器模式,如何请求一个专有服务器连接 实务155 如何确定数据库中有多少个共享服务器进程(Shared Server Processes) 实务 实务156 如何确定数据库中有多少个调度进程(Dispatcher) 实务157 如何增加调度进程(Dispatcher)的数量 实务 实务158 如何增加共享服务器进程(Shared Server Processes)的数量 实务159 如何关闭指定的调度进程 实务160 使用数据库时,报告错误“ORA-00104: deadlock detected; all public servers blocked waiting for resources” 实务161 关闭数据库时,报告错误“ORA-00106: cannot STARTUP/SHUTDOWN database when Connected to a dispatcher” 实务162 启动数据库时,报告错误“ORA-00132: syntax error or unresolved network name 'listeners_wm'” 实务 实务163 如何把数据库从共享服务器模式(Shared Server)改成专有服务器模式(Dedicatied Server)之手工篇 实务164 如何把数据库从共享服务器模式(Shared Server)改成专有服务器模式(dedicatied server)之DBCA篇 实务165 如何判断数据库是运行在专有服务器模式,还是共享服务器模式 实务166 数据库已经被配置成共享服务器模式,为什么客户端请求到的还是专有服务器连接? 实务 实务167 如何判断客户端请求到的是专有服务器连接还是共享服务器连接 第8章 掌握两个管理问题——表空间和数据文件的管理 实务168 如何创建大文件表空间 实务169 如何创建表空间 实务170 如何删除表空间 实务171 如何知道表空间PRODUCT由哪些数据文件组成 实务172 如何创建非标准块表空间 实务173 如何把字典管理的表空间(Dictionary Extent Management)转换成本地管理的表空间Local Extent Management) 实务174 如何把本地管理的表空间(Local Extent Management)转换成字典管理的表空间(Dictionary Extent Management) 实务175 为什么表空间离线后无法在线 实务176 用DELETE语句删除表中数据以后,为什么表空间的空闲空间没有增加 实务 实务177 如何禁止任何人写表空间test 实务178 如何对一个表空间进行扩展 实务179 如何限制某个用户对表空间的使用(Tablespace Quota) 实务180 如何使只读表空间可读/写 实务 实务181 如何使一个表空间在线 实务182 如何使一个表空间离线 实务183 如何重命名表空间 实务184 如何知道数据库中有哪些表空间 实务185 如何知道一个表空间的存储参数(Storage Parameters) 实务186 如何知道表空间的空间使用情况 实务187 如何知道哪些表空间是本地管理的 实务188 把表空间设置成只读,为什么很长时间还没有完成 实务189 如何收缩表空间 实务190 如何使用户能够使用另外一个表空间 实务191 如何把永久表空间转换成临时表空间 实务192 如何知道数据库中所有用户的默认表空间 实务193 如何得到创建表空间的SQL语句 实务194 对表空间进行操作时,报告错误“表空间不存在” 实务195 删除表空间时,报告错误“ORA-22868: table with LOBs contains Segment in different Tablespaces” 实务196 创建表时,报告错误:ORA-01950: no privileges on Tablespace 'USERS'” 实务197 删除表空间时,报告错误“ORA-01549: Tablespace not empty, use INCLUDING CONTENTS option” 实务198 删除表空间时,报告错误“ORA-02429: cannot DROP index used for enforcement of unique/primary key” 实务 实务199 创建表时,报告错误“ORA-01536: space quota exceeded for Tablespace 'TBST'” 实务 实务200 创建表空间时,报告错误“ORA-27038: created file already exists(创建的数据文件已经存在) 实务 201 创建表空间时,报告错误“ORA-12913: Cannot create dictionary managed Tablespace” 实务202 报告错误“ORA-03212:temporary Segment cannot be create in locally-managed Tablespace” 实务203 创建表时,报告错误“ORA-01659: unable to allocate MINEXTENTS beyond in Tablespace TP” 实务204 创建表时,报告错误“Ora-01658:unable to create INITAL Extent for Segment in Tablespace TP” 实务205 删除表空间时,报告错误“ORA-23515: materialized views and/or their indices exist in the tablespac” 实务 实务206 不能删除表空间,报告错误“ORA-00942: table or view does not exist” 实务207 创建表空间时,报告错误“ORA-29339: Tablespace Block SIZE 16384 does not match configured Block Sizes” 实务208 删除表空间时,报告错误“ORA-25183: index-organized table top index Segment is in a different Tablespace” 实务209 往表空间中添加数据文件时,报告错误“ORA-00059: maximum number of DB_FILES exceeded” 实务210 往表中插入数据时,报告错误“ORA-01653: unable to extend table REP.PHONE_ RESUME by in Tablespace TBS_PRO” 实务211 往表中插入数据时,报告错误“ORA-1654: unable to extend index PRODUCT. IND_STY by in Tablespace IND_TBS” 实务212 如何创建临时表空间 实务213 如何知道数据库中有哪些临时表空间 实务214 如何知道数据库使用哪个临时表空间作为默认临时表空间(Default Temporary Tablespace) 实务 实务215 如何改变数据库默认的临时表空间 实务216 如何重建临时表空间 实务217 临时表空间为空的错误(ORA-25153:temporary Tablespace is empty) 实务218 删除临时表空间时,报告错误“ORA-12906: cannot DROP default temporary Tablespace” 实务 实务219 改变临时文件时,报告错误“ORA-01516: nonexistent log file, datafile, or TEMPFILE” 实务220 报告错误“ORA-01652:unable to extend temp Segment by inTablespace TEMP” 实务221 创建临时表空间时,提示错误“ORA-25139: invalid option for CREATE TEMPORARY TABLESPACE” 实务222 如何创建回滚表空间 实务223 如何删除回滚表空间 实务224 如何查看数据库中回滚段的管理方式 实务225 如何往回滚表空间中增加数据文件 实务226 如何显示数据库当前正在使用的回滚表空间 实务227 如何切换回滚表空间 实务228 如何使用回滚段自动管理 实务229 如何知道数据库中有哪些回滚表空间 实务230 如何重建数据库正在使用的当前回滚表空间(活动回滚表空间) 实务231 使用数据库时,报告错误“ORA-01650: unable to extend rollback Segment RB01 by in Tablespace UNDOTBS1” 实务232 如何移动数据文件 实务233 如何删除数据文件 实务234 如何使数据文件离线 实务235 如何知道数据文件的使用情况 实务236 如何使数据文件PRODUCT1在线 实务237 如何重命名数据文件PRODUCT2 实务238 如何增加数据文件的尺寸 实务239 如何使数据文件自动扩展 实务240 如何知道整个数据库中有哪些数据文件 实务241 改变数据文件的尺寸时,报告错误“ORA-03297: file contains used data beyond requested RESIZE value” 实务242 不能扩展数据文件(ORA-01237: cannot extend datafile ) 实务 实务243 往表空间中添加数据文件时,报告错误“ORA-01641: Tablespace 'TBS_CONTRO' is not online - cannot add data file” 第9章 进程管理 实务 第10章 内存管理 实务 第11章 用户管理 实务 第12章 数据导出 实务 第13章 数据导入 实务 第14章 重中之重——控制文件的管理 第15章 成为数据库的最高统治者——口令文件(Password File)管理 第16章 联机日志文件管理 实务 第17章 参数文件(PFILE/SPFILE)管理 第18章 全球应用——分布式数据库疑难攻略 实务 第19章 并不陌生的问题——裸设备 实务 第20章 备份/恢复之基石——归档(Archivelog)管理 实务 第21章 必行之举——数据库备份 第22章 失而复得——数据库恢复 第23章 数据库通用语言——SQL语句 第24章 模式对象(Schema Object)的管理 第25章 PL/SQL应用程序开发 实务
14.34MB
Mastering Django Core.pdf
2016-12-31Delivers absolutely everything you will ever need to know to become a master Django programmer About This Book * Gain a complete understanding of Django-the most popular, Python-based web framework in the world * Gain the skills to successfully designing, developing, and deploying your app * This book is packaged with fully described code so you can learn the fundamentals and the advanced topics to get a complete understanding of all of Django's core functions Who This Book Is For This book assumes you have a basic understanding of the Internet and programming. Experience with Python or Django would be an advantage, but is not necessary. It is ideal for beginner to intermediate programmers looking for a fast, secure, scalable, and maintainable alternative web development platform to those based on PHP, Java, and dotNET. What You Will Learn * Use Django to access user-submitted form data, validate it, and work with it * Get to know advanced URLconf tips and tricks * Extend Django's template system with custom code * Define models and use the database API to create, retrieve, update, and delete records * Fully extend and customize the default implementation as per your project's needs * Test and deploy your Django application * Get to know more about Django's session, cache Framework, and middleware In Detail Mastering Django: Core is a completely revised and updated version of the original Django Book, written by Adrian Holovaty and Jacob Kaplan-Moss - the creators of Django. The main goal of this book is to make you a Django expert. By reading this book, you'll learn the skills needed to develop powerful websites quickly, with code that is clean and easy to maintain. This book is also a programmer's manual that provides complete coverage of the current Long Term Support (LTS) version of Django. For developers creating applications for commercial and business critical deployments, Mastering Django: Core provides a complete, up-to-date resource for Django 1.8 LTS with a stable code-base, security fixes and support out to 2018. Style and approach This comprehensive step-by-step practical guide offers a thorough understanding of all the web development concepts related to Django. In addition to explaining the features of Django, this book provides real-world experience on how these features fit together to build extraordinary apps. Table of Contents Chapter 1: Introduction to Django and Getting Started Chapter 2: Views and URLconfs Chapter 3: Templates Chapter 4: Models Chapter 5: The Django Admin Site Chapter 6: Forms Chapter 7: Advanced Views and URLconfs Chapter 8: Advanced Templates Chapter 9: Advanced Models Chapter 10: Generic Views Chapter 11: User Authentication in Django Chapter 12: Testing in Django Chapter 13: Deploying Django Chapter 14: Generating Non-HTML Content Chapter 15: Django Sessions Chapter 16: Djangos Cache Framework Chapter 17: Django Middleware Chapter 18: Internationalization Chapter 19: Security in Django Chapter 20: More on Installing Django Chapter 21: Advanced Database Management Appendix A: Model Definition Reference Appendix B: Database API Reference Appendix C: Generic View Reference Appendix D: Settings Appendix E: Built-in Template Tags and Filters Appendix F: Request and Response Objects Appendix G: Developing Django with Visual Studio
1004KB
双四元数理论教程dual-quaternion.pdf
2020-08-18A Beginners Guide to Dual-Quaternions 双四元数理论教程dual-quaternion In this paper, we give a beginners guide to the practicality of using dual-quaternions to represent the rotations and translations in character-based hierarchies. Quaternions have proven themselves in many fields of science and computing as providing an unambiguous, un-cumbersome, computationally efficient method of representing rotational information. We hope after reading this paper the reader will take a similar view on dual-quaternions. We explain how dual number theory can extend quaternions to dual-quaternions and how we can use them to represent rigid transforms (i.e., translations and rotations). Through a set of examples, we demonstrate exactly how dual-quaternions relate rotations and translations and compare them with traditional Euler’s angles in combination with Matrix concatenation. We give a clear-cut, step-by-step introduction to dual-quaternions, which is followed by a no-nonsense how-to approach on employing them in code. The reader, I believe, after reading this paper should be able to see how dual-quaternions can offer a straightforward solution of representing rigid transforms (e.g., in complex character hierarchies). We show how dual-quaternions propose a novel alternative to pure Euler-Matrix methods and how a hybrid system in combination with matrices results in a faster more reliable solution. We focus on demonstrating the enormous rewards of using dual-quaternions for rigid transforms and in particular their application in complex 3D character hierarchies.
-
下载
R-30iB Mate控制器 外气导入型机柜.pdf
R-30iB Mate控制器 外气导入型机柜.pdf
-
下载
互联网+区域健康信息平台建设方案.pptx
互联网+区域健康信息平台建设方案.pptx
-
下载
ad图层pcb画图.txt
ad图层pcb画图.txt
-
下载
基于计算机视觉的自动驾驶应用.zip
基于计算机视觉的自动驾驶应用.zip
-
下载
linq动态分组.cs
linq动态分组.cs
-
下载
驱动Driver_718.zip
驱动Driver_718.zip
-
下载
bmp位图转PCB文件工具 1.0绿色免费版.exe
bmp位图转PCB文件工具 1.0绿色免费版.exe
-
下载
MT32F005_006规格书_V1.2.pdf 航天民芯
MT32F005_006规格书_V1.2.pdf 航天民芯
-
下载
东南大学图像处理ppt
东南大学图像处理ppt
-
下载
Satellite-Tool-Kit(STK)培训教材
Satellite-Tool-Kit(STK)培训教材
