在WinForm开发中,在处理大量数据时不免会有耗时较长的操作,如果将这些操作放在主线程里,软件界面会有较长时间的“无响应”,降低了用户体验,常用的解决方式是加上进度条。
实现思路--------------------------------------------------------------------------------使用BackgroundWorker(已经封装好的线程工具)控件在后台线程执行费时的操作,在主线程中打开一个进度条窗体显示进度。
实现步骤--------------------------------------------------------------------------------第0步:创建一个具有进度条的窗体,以显示进度新建窗体ProcessForm,设置属性FormBorderStyle为None,添加一个ProcessBar控件,如下图所示:进度条窗体PrcessBar的Style属性设置为MarQuee。
在ProcessForm添加如下公共属性:?1234567891011121314151617181920212223//////设置提示信息///publicstringMessageInfo{set{this.labelInfor.Text=value;}}//////设置进度条显示值///publicintProcessValue{set{this.progressBar1.Value=value;}}//////设置进度条样式///publicProgressBarStyleProcessStyle{set{this.progressBar1.Style=value;}}第1步:创建进度条管理类ProcessOperator在该类中添加如下字段:?12privateBackgroundWorker_backgroundWorker;//后台线程privateProcessForm_processForm;//进度条窗体添加如下公共属性、方法和事件:?123456789101112131415161718192021222324252627282930#region公共方法、属性、事件//////后台执行的操作///publicActionBackgroundWork{get;set;}//////设置进度条显示的提示信息///publicstringMessageInfo{set{_processForm.MessageInfo=value;}}//////后台任务执行完毕后事件///publiceventEventHandlerBackgroundWorkerCompleted;//////开始执行///publicvoidStart(){_backgroundWorker.RunWorkerAsync();_processForm.ShowDialog();}#endregion其中,属性BackgroundWork可以指向一个无参数的方法,这里(客户端代码)用来指向要在
2024/4/20 19:27:33 34KB Winform 进度条 Background Worker
1
深入理解计算机系统kindle版,prc格式的深入理解计算机系统,比较模糊
2024/2/12 21:50:34 41.19MB 计算机系统
1
是一款成熟的心理测试软件其中包括EPQ-A、EPQ-C、爱德华个性偏好量表、MMPI、NS、工作激情程度量表、HOLLAND、几乎把握能力测试、进取性水平测试、16PF、SOC、QSEQ、FIS、PDQ、人际合作程度测试、瑞文标准推力测试、瑞文高级推力测试、SAD、师生关系困扰调查表、同学关系困扰调查表、学生生活应激问卷、职业核心竞争力量表、职业兴趣问卷、MSMH、MSSP、MSSM、MSRP、MSMT、STAI、自主程度测试、SEI,以及众多精神科心理测评,如AIS、BSSD、GAS、TAS、NBPRS、NOSIE、RWEW、BPRS、MMSE、PRCA、JDZZ、PCLSV、CPRS、SCID-AD、CMI、SERS、SCAG、CESDS、MACHV、MAST、CACR、HIS、CCMD、SDSS、SAPS、GHTS、Y-BOCS、SANS、BRMS、TESS、RSESE、JF、HAD,以及众多心理卫生量表和儿童气质评测
2024/2/1 4:04:23 1.93MB 心理测评
1
cndcom.exe和scanms.exe两个工具的用处自己百度,刚刚从朋友手上弄来的。
网上有点难找。
2023/11/25 8:37:54 467KB scanms cndcom
1
SPRC087下载,含IQmath中文手册,含IQmath的使用方法。
1
资源阐发:1.付与nginx最新版编译,搜罗最新的nginx-http-flv-module,以及底子模块openssl、prce、zlib2.部份打包,已经配置配备枚举好nginx.conf的http-flv直播流,以及httpweb情景。
无需任何配置配备枚举就可使用3.自带windows的效率注册法度圭表标准,使用如下方式,将nginx注册为windows的效率,实现无人值守掩护管理windows效率注册:1.将收缩包解压到D:\nginx-1.19.3目录下2.使用cmd召唤掀开DOS,并切换到D:\nginx-1.19.33.使用nginxservice.exeinstall装置
2023/4/19 19:39:03 2.17MB nginx http-flv nginx-http-flv直播 windows
1
DiscovercleanwaystowritecodethatwillrunonbothPython2and3.Thisbookistutorial-orientedwithdetailedexamplesofhowtoconvertexistingPython2-compatiblecodetocodethatwillrunreliablyonbothPython2and3.AlthoughPython3isconsideredthefutureofPython,Python2.xwillbemaintainedforseveralmoreyears,alongsidePython3,whichisnotbackwardscompatible.Forthosewhoneedtosupportbothversions,thisbookguidesyouthroughtheprocess.Python2and3CompatibilityexplainsthesyntacticaldifferencesbetweenPython2and3,andhowtousePythonpackagesPython-FutureandSixtoimplementneutralcompatibility.Developersworkingoneithersmall,medium,orlargeprojectswillappreciatetheauthor'sclearexplanations,detailedexamples,andcleantechniquestohelpthemextendsupportforbothversionstotheirexistingPython2-compatibleprojects.WhatYou'llLearnUnderstandthesyntacticaldifferencesbetweenPython2and3UsetheSixandFutureLibrariesReviewthenewfeaturesinPython3ChoosewhichPythonversionstosupportwhendoingneutralsupportDecideonwhethertoportorprovidesupportforbothversionsWhoThisBookIsForProfessionalPythondevelopersandenthusiaststhatwanttoimplementPython3supportfortheirexistingPython2compatiblecode.TableofContentsChapter1:PrintingandBacktickreprChapter2:NumbersChapter3:SettingMetaclassesChapter4:StringsandBytesChapter5:PackageImportsChapter6:ExceptionsChapter7:HTMLProcessingChapter8:WorkingwithFilesChapter9:CustomBehaviorofClassesChapter10:CollectionsandIteratorsChapter11:MoreBuilt-insChapter12:StandardLibraryModules
2023/3/9 3:48:15 1.6MB Python
1
《格理论与密码学》主要引见格理论中的基础理论、关键技术及其在密码学中的典型应用。
主要包括三方面内容:格理论与密码学的基础知识,包括数论基础、抽象代数基础、向量空间、对称密码体制、公钥密码体制、哈希函数等;
格理论的基础理论和关键技术,包括格的基本定义、格中的计算性难题、最短向量问题、最近向量问题、二维格中的高斯格基约减算法、LLL格基约减算法及其衍生和变形、LLL与apprCVP问题以及格基约减算法的MATLAB实现;
格理论在密码学中的典型应用,包括基于格的密码系统分析方法以及基于格理论的哈希函数。
2023/3/7 17:45:33 7.33MB 格理论 密码学 数论
1
cissp官方进修指南第八版(英文),改版后2018最新进修指南。
不用看cbk那么费劲,就看这个版本九百多页,八个知识域全覆盖,还省事。
DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2023/2/8 11:30:06 18.38MB cissp 官方英文版
1
在VS2010下,把prce源文件直接引入到工程中,直接调用prce中的正则表达式。
没有运用单独创建lib工程。
运用的版本是pcre-8.35
2017/9/26 18:21:16 269KB VC VS2010 prce
1
共 18 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡