Flylib.com
Index_K
Previous page
Table of content
Next page
K
key risk areas 79
knowledge-based trust 89
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Foundations and Principles of Security
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Introducing the Assessment Process
Determining What Tools to Use
Procurement Terminology
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Leading change
Part II - The Applications
Restructuring
Mergers and acquisitions
Cultural change
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
What Is Job Scheduling?
Using the JobStoreCMT
Brief Overview of Java RMI
Using Quartz Within a Web Application
Introducing the Quartz Web Application
FileMaker 8 Functions and Scripts Desk Reference
Get(DesktopPath)
Get(SystemVersion)
Get(WindowDesktopHeight)
TextSize()
FileMaker XML Grammars
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies