Flylib.com
Index_N
Previous page
Table of content
Next page
N
nDosa 129
network disconnect devices 65
networked system exploitation 53
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
The Goals and Objectives of a Risk Assessment
Best Practices for Quantitative and Qualitative Risk Assessment
Introducing the Assessment Process
Training IT Staff and End Users
Typical RFP Procurement Steps
SQL Tips & Techniques (Miscellaneous)
Using Keys and Constraints to Maintain Database Integrity
Working with Functions, Parameters, and Data Types
Understanding Transaction Isolation Levels and Concurrent Processing
Retrieving and Manipulating Data Through Cursors
Repairing and Maintaining MS-SQL Server Database Files
Microsoft WSH and VBScript Programming for the Absolute Beginner
Using Procedures to Organize Scripts
Using the Windows Registry to Configure Script Settings
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Automation Executables
Working with the Window Object
Caching Data in the Data Island
Conclusion
Implementing IDTExtensibility2
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Making Quantitative Decisions
Expense Accounting and Earned Value
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Inserting Pictures into Diagrams
Key Points
Connecting Shapes
Laying Out Office Spaces
Glossary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies