包含标签:Java 的文章
-
Introduction principle and practice of spring security
In web application development, security is undoubtedly very important. Choosing spring security to protect web applic…… -
Factorization using tail recursion
Usually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c…… -
Using scheduled tasks in spring projects
When we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
java. lang.NoSuchMethodError: javax. servlet. ServletContext. getContextPath()Ljava/lang/String;
Problem Description: in eclipse 3 This error always occurs when starting Tomcat6 in 7, java. lang.NoSuchMeth…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; …… -
Problems caused by cookies containing Chinese
On Friday, after the project test was completed and there was no problem, it went online. After going online, it was f…… -
-
HTTP 403, Tomcat configures HTTPS, unable to access, return status code HTTP 403
In order to access the application started by the local machine (Windows system) in the form of HTTPS, after generatin…… -
Loading of Java classes
Keyworked Java class loading, class loading mechanism, classloader, parent delegation model, parent delegation model W…… -
Java uses zxing to generate QR code bar code
1、 Add the Maven dependency of zxing, or download the zxing jar package This example uses zxing3 Version 2.0 Maven de…… -
Three implementations of Java proxy
The Java proxy mode can be implemented in the following ways: 1. Static proxy. 2. JDK dynamic agent. 3. C…… -
Mybatis source code Learning Series
preface A long time ago, we learned Java from a console of Hello world At the beginning, we entered the object-oriente…… -
13000 word HashMap interview must ask for detailed explanation of knowledge points
an introduction to Inheritance of hasmap Principle of HashMap Ways to resolve hash conflicts Open addressing This met…… -
Detailed explanation of hashtable in Java
an introduction to Hashtable is a legacy class. The common functions of many mappings are similar to HashMap. The diff…… -
Java de encryption (AES / CBC) exception on Linux: Java Lang. SecurityException: JCE cannot authenticate the provider BC method
When using MapReduce for data cleaning, you need to decrypt the data. The encryption method is AES / CBC / pkcs7paddin…… -
Mac OS fast switching JDK version
Recommended management method: be careful! You can view the current version through Java - version on the command line…… -
JavaWeb learning notes (III) JavaScript
1. Introduction to JavaScript 1、 What is JavaScript 2、 JavaScript features 3、 The difference between Java and JavaS…… -
Front end Foundation (1), HTML
1. Foreword 1.1 software architecture 1.2 the page consists of three parts 2. Introduction to HTML 3. Create HTML file…… -
Java web learning notes (6) JSP
Chapter 6. JSP 1. What is JSP 2. JSP essence 1. JSP is essentially a servlet program 3. Three syntax of JSP 3.1. Page …… -
JavaWeb learning notes (IV) jquery
1、 Introduction to jquery 2、 Preparations before using jquery 3、 Core function $() 4、 Differences between jQuery o…… -
It turns out that hot loading is so simple. Write a Java hot loading manually
1. What is hot loading Hot loading means that the changed code can take effect without restarting the service. Hot loa…… -
[source code analysis] how are ArrayList and LinkedList implemented? I think you still have a chance!
preface Seriously, among the collection classes most used in Java, list definitely occupies a place. Like map, it is a…… -
Do you understand distributed transactions? What is your data consistency solution across multiple services?
preface Look at the title. This is another question asked in the interview. In fact, this question was asked several t…… -
Learning series of Java Xiaobai collection source code: LinkedList
LinkedList source code learning Portal: learning series of Java Xiaobai collection source code: ArrayList This is the …… -
Basic usage of arrays class in Java
First knowledge of Java arrays class The arrays class includes many static methods (such as sorting and searching) for…… -
This of Java keyword
This of Java keyword concept This keyword can only be used inside a method to refer to the "object calling the method"…… -
Java concurrent reading notes: how to realize correct communication between threads
1、 Synchronized and volatile The synchronized keyword is a mutually exclusive built-in lock provided by Java. The loc……
