Flylib.com
Part I: Introduction
Previous page
Table of content
Next page
Chapter 1. Security by Default
Chapter 2. Basics of Security
Previous page
Table of content
Next page
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204
Authors:
Christopher Steel
,
Ramesh Nagappan
,
Ray Lai
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
The Art of Using Animated Sprites for 2D Games
Playing Some Tunes CD Audio, MIDI and MP3 Music
Loading and Saving Information Using Files
Fundamentals of 3D Graphics Programming
Appendix A Answers to the Chapter Quizzes
Agile Project Management: Creating Innovative Products (2nd Edition)
The Guiding Principles of Agile Project Management
Customers and Products
Practice: Feature Cards
The Commitment-Accountability Protocol
Implementing the Vision
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.6 How to use PuTTY Passphrase Agents
Step 6.1 Port Forwarding
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Appendix - Sample sshd_config File
101 Microsoft Visual Basic .NET Applications
Working with the .NET Framework
GDI+
Building Enterprise Services Applications
COM Interop/PInvoke
Coding Conventions
Programming Microsoft ASP.NET 3.5
The Web Forms Model
The ADO.NET Object Model
The HTTP Request Context
ASP.NET Security
HTTP Handlers and Modules
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Time Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies