Flylib.com
Section 24.6. Acknowledgments
Previous page
Table of content
Next page
24.6. Acknowledgments
This work was funded, in part, by NSF Award IIS-0325035.
Previous page
Table of content
Next page
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295
Authors:
Lorrie Faith Cranor
,
Simson Garfinkel
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
Risk-Assessment Methodologies
Choosing the Best Risk-Assessment Approach
Introducing the Assessment Process
Notice
Developing Tablet PC Applications (Charles River Media Programming)
Obtaining the Tablet PC SDK
Using Gestures to Control Tablet Media Player
Advanced Microsoft Agent
Power Management for the Tablet PC
Pong Game
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 16. Who Are the Neighbors Voting For?
Hack 43. Map Earthquakes in (Nearly) Real Time
Hack 62. Build a Car Computer
Hacks 78-86
Hack 94. Geo-Warchalking with 2-D Barcodes
Microsoft VBScript Professional Projects
Customizing the Desktop
Using Configuration Files to Control Script Execution
Maintaining a 30-Day Summary Log Archive
Building the Web Sites Main Page
Building the Report Archive Page
802.11 Wireless Networks: The Definitive Guide, Second Edition
User Authentication with 802.1X
Contention-Free Access Using the PCF
High Rate Direct Sequence PHY
11g: The Extended-Rate PHY (ERP)
ERP Physical Medium Dependent (PMD) Layer
Programming .Net Windows Applications
CommonDialog Classes
Control Class
Mouse Events
ListView
Class Hierarchy
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies