Flylib.com
Index_I
Previous page
Table of content
Next page
I
identification-based trust 90
identify theft 11
identification of scope 79
information architecture 96
information assets 4
information assurance 22, 56
information loss 10
information security 34, 96
information systems 4
information transfer 9
infrastructure security plan 60
instant messaging (IM) 34
integrity 122
internal threat 54, 102
Internet protocol (IP) 3
Internet- related fraud 10
intrusion detection systems (IDS) 64
ISO security architecture 21
IT risk management 67
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Executable File Format
Process Memory Addresses
Ending a Process
Named Pipes
C.3. RPC Keywords
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Identifying Project Schedule Risk
Identifying Project Resource Risk
Quantifying and Analyzing Project Risk
Appendix A Selected Detail From the PERIL Database
Java for RPG Programmers, 2nd Edition
The Java Onion
Data Types And Variables
String Manipulation
Date And Time Manipulation
Threads
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
802.11 Wireless Networks: The Definitive Guide, Second Edition
Detailed PCF Framing
Gaussian Frequency Shift Keying (GFSK)
OFDM PLCP
Atheros-Based cards and MADwifi
Power over Ethernet (PoE)
Extending and Embedding PHP
Data Conversion
Summary
Zend Hash API
Implementing a Wrapper
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies