Computer Programming with the Nim Programming Language
Arrays and sequences Slices Value objects and references References and pointers Procedures and functions Object-oriented programming and inheritance Other builtin data types Iterators Templates Casts storage Streams and files String processing Arrays and sequences Random numbers Timers Hash tables Hash sets Operating system services Command-line parsing Regular expressions Part IV: Some Programming repetition. Part III will give you an overview of Nim’s standard library, which contains many useful functions and data types that we can use in our programs to solve common tasks like input and output operations0 码力 | 865 页 | 7.45 MB | 1 年前3
Computer Programming with the Nim Programming Language
Arrays and sequences Slices Value objects and references References and pointers Procedures and functions Object-oriented programming and inheritance Other builtin data types Iterators Templates Casts storage Streams and files String processing Arrays and sequences Random numbers Timers Hash tables Hash sets Operating system services Command-line parsing Regular expressions Part IV: Some Programming repetition. Part III will give you an overview of Nim’s standard library, which contains many useful functions and data types that we can use in our programs to solve common tasks like input and output operations0 码力 | 784 页 | 2.13 MB | 1 年前3
CakePHP Cookbook Documentation 5.xFiles with I18n Shell Setting the Default Locale Changing the Locale at Runtime Using Translation Functions Using Variables in Translation Messages Plurals Creating Your Own Translators Creating Message Collection Methods Reusable Optimizing Collections Making Collections Rewindable Cloning Collections Hash Hash Hash Path Syntax Expression Types Attribute Matching Types Http Client Client Doing Requests Creating Transforming an Array into a String of XML Using Namespaces Creating a Child Constants & Functions Global Functions __d() __dn() __dx() __dxn() __n() __x() __xn() collection() debug() dd() pr() pj() env()0 码力 | 1080 页 | 939.39 KB | 1 年前3
CakePHP Cookbook 4.x
Files with I18n Shell Setting the Default Locale Changing the Locale at Runtime Using Translation Functions Using Variables in Translation Messages Plurals Creating Your Own Translators Creating Message Rewindable Cloning Collections Folder & File Basic Usage Folder API Folder File API File Hash Hash Hash Path Syntax Expression Types Attribute Matching Types Http Client Client Doing Requests Creating Transforming an Array into a String of XML Using Namespaces Creating a Child Constants & Functions Global Functions __d() __dn() __dx() __dxn() __n() __x() __xn() collection() debug() dd() pr() pj() env()0 码力 | 1249 页 | 1.04 MB | 1 年前3
CakePHP Cookbook 3.x
Files with I18n Shell Setting the Default Locale Changing the Locale at Runtime Using Translation Functions Using Variables in Translation Messages Plurals Creating Your Own Translators Creating Message Making Collections Rewindable Cloning Collections Folder & File Basic Usage Folder API File API Hash Hash Path Syntax Expression Types Attribute Matching Types Http Client Doing Requests Creating Multipart Transforming an Array into a String of XML Using Namespaces Creating a Child Constants & Functions Global Functions Core Definition Constants Timing Definition Constants Chronos Debug Kit Migrations ElasticSearch0 码力 | 1244 页 | 1.05 MB | 1 年前3
CakePHP Cookbook 2.x
application, that information is available in $this->request->data. You can use the pr() or debug() functions to print it out if you want to see what it looks like. We use the FlashComponent’s FlashComponent::success() [https://api.cakephp.org] to see the formats in which you can specify a URL for various CakePHP functions. Calling the save() method will check for validation errors and abort the save if any occur. We’ll rerouting should work correctly. URL-Rewriting on lighttpd Lighttpd does not support .htaccess functions, so you can remove all .htaccess files. In the lighttpd configuration, make sure you’ve activated0 码力 | 1096 页 | 958.62 KB | 1 年前3
Hyperledger Fabric 1.2 Documentationtransactions that have been validated by a consensus protocol, grouped into blocks that include a hash that bind each block to the preceding block. The first and most widely recognized application of of the governance model. Smart Contracts A smart contract, or what Fabric calls “chaincode”, functions as a trusted distributed application that gains its security/trust from the blockchain and the underlying io/en/release- 1.2/access_control.html]: How to configure which client identities can interact with peer functions on a per channel basis. Pluggable endorsement and validation [https://hyperledger- fabric.readthedocs0 码力 | 497 页 | 6.59 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationtransactions that have been validated by a consensus protocol, grouped into blocks that include a hash that bind each block to the preceding block. The first and most widely recognized application of of the governance model. Smart Contracts A smart contract, or what Fabric calls “chaincode”, functions as a trusted distributed application that gains its security/trust from the blockchain and the underlying Contracts To support the consistent update of information — and to enable a whole host of ledger functions (transacting, querying, etc) — a blockchain network uses smart contracts to provide controlled access0 码力 | 528 页 | 6.85 MB | 1 年前3
Flask Documentation (1.1.x)Response Objects Sessions Session Interface Test Client Test CLI Runner Application Globals Useful Functions and Classes Message Flashing JSON Support Template Rendering Configuration Stream Helpers Useful that cookies are set on response objects. Since you normally just return strings from the view functions Flask will convert them into response objects for you. If you explicitly want to do that you can object that is unique for each request. It is used to store data that might be accessed by multiple functions during the request. The connection is stored and reused instead of creating a new connection if0 码力 | 428 页 | 895.98 KB | 1 年前3
Hyperledger Fabric 1.1 DocumentationContracts To support the consistent update of information – and to enable a whole host of ledger functions (transacting, querying, etc) – a blockchain network uses smart contracts to provide controlled access the rules for reading or altering key value pairs or other state database information. Chaincode functions execute against the ledger’s current state database and are initiated through a transaction proposal double spend operations and other threats that might compromise data integrity, and allows for functions to be executed against non-static variables. In addition to the multitude of endorsement, validity0 码力 | 422 页 | 4.84 MB | 1 年前3
共 590 条
- 1
- 2
- 3
- 4
- 5
- 6
- 59













