Flylib.com
SYMBOL
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
802.1x
EAP-TLS mode
@ (at sign) in URLs
Previous page
Table of content
Next page
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295
Authors:
Lorrie Faith Cranor
,
Simson Garfinkel
BUY ON AMAZON
Software Configuration Management
Introduction to Software Configuration Management
The DoD CM Process Model
Appendix A Project Plan
Appendix I System Service Request
Appendix P Project Statement of Work
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Control Flow Testing
Test Planning
Section IV - Supporting Technologies
Section V - Some Final Thoughts
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Cable
Interior Routing Protocols
Traffic Policing
Dialer Interfaces (Dialer Profiles)
Encrypted Tunnels
MySQL Clustering
Installing MySQL-Max
Common Errors While Importing Tables
Management Nodes
Restoring a Backup
Logging Commands
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
FileMaker 8 Functions and Scripts Desk Reference
Text Functions
Get(UseSystemFormatsState)
GetNthRecord()
Middle()
System Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies