Flylib.com
Part II: Security Foundations
Previous page
Table of content
Next page
2 Information Assets
3 Threats
4 The Security Policy
5 Management Protocols and Functions
Previous page
Table of content
Next page
CCSP CSI Exam Cram 2 (Exam Cram 642-541)
ISBN: 0789730243
EAN: 2147483647
Year: 2002
Pages: 177
Authors:
Annlee Hines
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Object Types, Predicates, and Basic Constraints
Mapping ORM Models to Logical Database Models
Creating a Basic Logical Database Model
Logical Database Model Reports
Other Features and Best Practices
Qshell for iSeries
Introduction to Qshell
Running Qshell
Input and Output
Archives and Compression
Appendix A Summary of Changes by Release
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
SSL and TLS
Appendix A Solutions to Exercises
Java for RPG Programmers, 2nd Edition
Data Types And Variables
Arrays And Vectors
String Manipulation
An Object Orientation
Database Access
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Creating a Struts-based MVC Application
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
The Office Primary Interop Assemblies (PIAs)
Working with the Workbook Object
Working with the Application Object
Conclusion
VSTO Support for Excel Schema Mapping
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies