登录
首页 » Unix_Linux » android_key

android_key

于 2013-10-09 发布 文件大小:4KB
0 161
下载积分: 1 下载次数: 13

代码说明:

  android新增按键值流程,从底层到中间层再到上层app,对linux和android framework有个一定的认识(android key value added processes, from the bottom to the middle layer and then to the upper app, android framework for linux and have a certain understanding of)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • stm32 无刷电机控制板
    stm32f103c8t6 做主控 自制无刷电机(bldc )控制板,支持有感和无感两种模式。可通过硬件切换。内部包含原理图和源代码及照片,原创资料。
    2020-05-26下载
    积分:1
  • 答题app源码(android
    答题app源码(android)
    2021-05-06下载
    积分:1
  • Android文本阅读器
    Android文本阅读器
    2014-11-01下载
    积分:1
  • Android拍照封装 TakePicAndGallery-master
    Android拍照封装,比较全面,支持android7.0(Android Photo Encapsulation, more comprehensive, supporting Android 7.0)
    2020-06-20 05:40:01下载
    积分:1
  • 教你将Android手机变成蓝牙无线示波器
    说明:  实现蓝牙实时接收数据并以波形的形式显示在手机屏幕上,绘图采用sufaceView(use surfaceview to make buletooth link)
    2020-12-24 11:29:06下载
    积分:1
  • Android-music-player-source
    安卓音乐播放器源码,附带详细word文档说明。(Android music player source, with a detailed documentation.)
    2013-08-05 20:50:01下载
    积分:1
  • AliasActivityStub
    Alias Activity Test Source Code for Andriod.
    2013-10-10 01:06:11下载
    积分:1
  • android VideoView播放视频-source
    android VideoView播放视频-source
    2015-03-16下载
    积分:1
  • Activity_02
    Android 应用开发基础,Activity的使用和Layout布局设置(Android Develop Code)
    2011-11-17 14:28:13下载
    积分:1
  • ISSAuthorize
    Android与IIS身份验证案例源码,在Android移动项目开发中,访问服务器时,为了简洁方便,我们经常使用http协议来传递JSON格式的数据。然而有些项目需要有一定的安全性,如使用Android客户端登陆到MIS系统。虽然我们是通过Android手机客户端的登陆Activity中登陆到系统的,但是略懂电脑的黑客是能够跳过登陆Activity,从而直接进入系统的。这样,会造成一些由于系统的不安全所带来的麻烦。建立一种防止黑客强行登录的身份验证模式尤为重要。此时,系统的身份验证成为阻挡黑客登陆的一道屏障。那么,怎样实现一个身份验证呢?让我们以IIS为宿主,一步一步的实现身份验证吧(Android and IIS authentication case source code, in the Android mobile project development, access to the server, in order to be simple and convenient, we often use the HTTP protocol to transfer JSON format data. However, some of the project needs to have a certain security, such as the use of Android client login to the MIS system. Although we are through the Android mobile client landing Activity landing to the system, but slightly understand the computer hacker is able to skip the landing Activity, thus directly into the system. In this way, it will cause some of the problems caused by the system is not safe. It is particularly important to establish an identity authentication mode to prevent hackers logging in. At this point, the identity of the system has become a barrier to prevent hackers landing. So, how to achieve an identity verification? Let us take IIS as the host, step by step to achieve authentication bar)
    2016-06-20 11:04:56下载
    积分:1
  • 696518资源总数
  • 105559会员总数
  • 1今日下载