Flylib.com
Credits
Previous page
Table of content
Next page
About the Author
Contributors
Acknowledgments
Previous page
Table of content
Next page
Halo 2 Hacks: Tips & Tools for Finishing the Fight
ISBN: 0596100590
EAN: 2147483647
Year: 2004
Pages: 166
Authors:
Stephen Cawood
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Understanding the IT Security Process
Risk-Assessment Methodologies
Reducing the Risk of an Attack
Roles, Responsibilities, and Accountabilities
Appendix C. Security Assessment Sample Report
Certified Ethical Hacker Exam Prep
Key Terms
Apply Your Knowledge
Study Strategies
Apply Your Knowledge
Hacking Web Servers
A Practitioners Guide to Software Test Design
Case Studies
Equivalence Class Testing
Use Case Testing
Section III - Testing Paradigms
Section IV - Supporting Technologies
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Test Implementation
Test Execution
Improving the Testing Process
Appendix C IEEE Templates
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Introduction to Ink-Enabled Applications
Tablet PC Full Screen Utility
Using Gestures to Control Tablet Media Player
Advanced Microsoft Agent
Twisted Network Programming Essentials
Storing Web Data in an SQL Database
Authenticating Against a Database Table
Downloading Messages from an IMAP Mailbox
Running a Twisted Application as a Daemon
Managing Multiple Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies