Flylib.com
J
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
JAP (Java Anon Proxy)
Java Anon Proxy (JAP)
Jiminy
Just, Mike
Previous page
Table of content
Next page
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295
Authors:
Lorrie Faith Cranor
,
Simson Garfinkel
BUY ON AMAZON
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Assessing Business-IT Alignment Maturity
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
Governance Structures for IT in the Health Care Industry
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Working with Functions, Parameters, and Data Types
Working with Ms-sql Server Information Schema View
Repairing and Maintaining MS-SQL Server Database Files
Exploiting MS-SQL Server Built-in Stored Procedures
Postfix: The Definitive Guide
Message Store Formats
The Problem of Spam
Client-Detection Rules
Customized Restriction Classes
C.7. Wrapping Things Up
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Three Sales Process
Chapter Four Precall Planning and Research
Chapter Eleven Gaining Access to People with Power
Chapter Thirteen Closing: Reaching Final Agreement
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Unauthorized Activity II
Tcpdump
IDS and IPS Architecture
Snort
Comparing, Designing, and Deploying VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
MPLS Layer 3 VPNs Overview
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Comparing SSL VPNs to Other Types of Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies