Flylib.com
Index_I
Previous page
Table of content
Next page
I
i-mode 11, 236
iContract 24, 45, 46
inhibit dependence (ID) 36
innovation diffusion theory 161
instant messenger 187
intention -action protocol 38, 42
intergalactic client-server program (ICSP) 24, 34, 45
Internet 96
Internet protocol (IP) 12
interoperability 233
inventory tracking and dispatching 7
Previous page
Table of content
Next page
Mobile Commerce Applications
ISBN: 159140293X
EAN: 2147483647
Year: 2004
Pages: 154
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
SSL and TLS
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Managing Enterprise Systems with the Windows Script Host
Registry Operations
Regular Expressions
Network Administration/WMI
Messaging Operations
Exchange Server
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
The Ethics of Persuasive Technology
Captology Looking Forward
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Extending and Embedding PHP
Summary
Complex Structures
Declaring and Accessing INI Settings
Re-creating CLI by Wrapping Embed
Open Source Projects
FileMaker 8 Functions and Scripts Desk Reference
DayNameJ()
Get(ActiveFieldTableName)
Get(LastMessageChoice)
ValueListNames()
Project Management, Programming, and Software Development
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies