Flylib.com
Part VII: Personal Identification Using Smart Cards and Biometrics
Previous page
Table of content
Next page
Chapter 15. Secure Personal Identification Strategies Using Smart Cards and Biometrics
Previous page
Table of content
Next page
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204
Authors:
Christopher Steel
,
Ramesh Nagappan
,
Ray Lai
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Removing Objects from a Container
Merging Data
Representing a Fixed-Size Numerical Vector
Implementing a Dynamically Sized Matrix
Parsing a Complex XML Document
SQL Hacks
Hack 41. Copy Web Pages into a Table
Hack 44. Tunnel into MySQL from Microsoft Access
Organizing Data
Hack 81. Build Decision Tables
Hack 90. Implement Application-Level Accounts
Managing Enterprise Systems with the Windows Script Host
Introduction
File Operations
Input/Output Streams
Regular Expressions
Network Administration/WMI
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Part II - The Applications
Restructuring
Cultural change
IT-based process change
Cisco CallManager Fundamentals (2nd Edition)
The Three Responsibilities of Call Routing
Dialing Transformations
SCCP Station Devices
Call Detail Records
SCCP Call Signaling
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
The Hello, World Quartz Project
Volatility, Durability, and Recoverability
Using Memory to Store Scheduler Information
Listening for Scheduler Events
Using Quartz Remotely
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies