Flylib.com
Chapter 29. Security
Previous page
Table of content
Next page
Chapter 29. Security
Introduction
Related Files
Commands
Previous page
Table of content
Next page
Linux Desk Reference (2nd Edition)
ISBN: 0130619892
EAN: 2147483647
Year: 2000
Pages: 174
Authors:
Scott Hawkins
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Summary
Introduction
Multiplexing I/O with select
Key Terms and Concepts
Debugging Multithreaded Programs
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Business Continuity Planning and Disaster Recovery Planning
Legal, Regulations, Compliance, and Investigations
Understanding Certification and Accreditation
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Mastering Delphi 7
Writing Delphi Components
Libraries and Packages
Internet Programming: Sockets and Indy
Delphi for .NET Preview: The Language and the RTL
Appendix B Extra Delphi Tools from Other Sources
Microsoft VBScript Professional Projects
VBScript and the WSH
Maintaining a 30-Day Summary Log Archive
Building the Web Sites Main Page
Converting Reports to HTML Pages
Report Distribution and Remote Archive Management
Sap Bw: a Step By Step Guide for Bw 2.0
Part I. Guided Tours
Basic Concept of Data Warehousing
Using a Variable to Access a Hierarchy Node Directly
Loading Data into the InfoCube
Object Transport
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Phase 2 Engagement (Creating Pull)
Phase 3 Mobilization
Using DMAIC to Improve Service Processes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies