如何访问恶意软件保护的基本设置?
构建高度模块化的应用仅仅取决于两三个组件的基本设置。
Building highly modular application is only a matter of a basic setup of two or three components.
IDS 和其他任何类型的数据库的基本设置过程是相同的。
The setup between IDS and any other type of database would follow the same basic procedure.
I'll let you just grok it but you can see it's basically doing what I did over there. Setting up two indices for the two sub-list,it's just walking down, finding the smallest element, putting it into a new list. When it gets to the end of one of the lists, it skips to the next part, and only one of these two pieces will get called because only one of them is going to have things leftovers.
你们可以大体的浏览一下,但是它们基本就是我在那里所做的事情,为两个子列表设置了两个指针,指针顺着列表走下去,找到最小的元素,把它放入到一个新的列表中去,当它走到一个列表的尾部时,它会跳到下部分去,两部分中只有一个会被执行,因为只有一个会有元素剩余。
应用推荐