Flylib.com
Index_X
Previous page
Table of content
Next page
X
XML elements of JDO metadata, 168–181
XOR (^) operator, 53
Previous page
Table of content
Next page
Using and Understanding Java Data Objects
ISBN: 1590590430
EAN: 2147483647
Year: 2005
Pages: 156
Authors:
David Ezzio
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
Distinguished Names and Certificates
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Absolute Beginner[ap]s Guide to Project Management
The Impact of the Project Schedule
Determining the Project Budget
Creating a Project Budget
Controlling a Project
Options for Issue Log
Image Processing with LabVIEW and IMAQ Vision
Image Acquisition
Color Images
Morphology Functions
Reading Instrument Displays
Application Examples
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
PMP Practice Questions Exam Cram 2
Project Initiation
Answers and Explanations
Project PlanningCore Processes
Exam Prep Questions
Answers and Explanations
Understanding Digital Signal Processing (2nd Edition)
RADIX-2 FFT BUTTERFLY STRUCTURES
HIGHPASS FIR FILTER DESIGN
REMEZ EXCHANGE FIR FILTER DESIGN METHOD
COMPLEX DOWN-CONVERSION
REFERENCES
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies