Flylib.com
Index_D
Previous page
Table of content
Next page
D
data encryption 3
data warehouse 4
denial of service (DoS) 3, 44, 121
deterrence-based trust 89
digital information 91
disaster recovery 67
disaster recovery plan 59
disaster recovery planning 104
Do Not Call list 11
dynamic host configuration protocol (DHCP) 127
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Project Risk
Monitoring and Controlling Risky Projects
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Cisco IP Manager Assistant Architecture
Installing Cisco VT Advantage on a Client
User Report Configuration
Building Web Applications with UML (2nd Edition)
Activities
Analysis Model Structure
HTML to UML
Sample Screen Shots
Use Case View
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Detailed Test Planning
Test Execution
The Test Organization
The Software Tester
Data Structures and Algorithms in Java
Summary
Vocabulary
The Stack Interface
Recursion
Quicksort
Information Dashboard Design: The Effective Visual Communication of Data
All That Glitters Is Not Gold
Dispelling the Confusion
Choosing a Deficient Measure
Applying the Principles of Visual Perception to Dashboard Design
A Final Word
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies