Flylib.com
Z
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
Zero (Defect) Quality Control (ZQC) [See deploying
poka yoke
systems.]
Previous page
Table of content
Next page
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
ISBN: 0131872508
EAN: 2147483647
Year: 2006
Pages: 394
Authors:
Bijay K. Jayaswal
,
Peter C. Patton
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Appendix C Using the Bouncy Castle API for Elliptic Curve
High-Speed Signal Propagation[c] Advanced Black Magic
Lumped-Element Region
Other Limitations of the FFT
FAQ: Older Cable Types
150- W STP-A Connectors
Appendix C. Two-Port Analysis
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Point-to-Point Protocol (PPP)
Internet Protocol Version 6 (IPv6)
User Datagram Protocol
File and Printer Sharing
Virtual Private Networks (VPNs)
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
Partial Page Rendering
The AJAX Control Toolkit
Building AJAX Applications with ASP.NET
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
Comparing, Designing, and Deploying VPNs
Review Questions
Deploying Site-to-Site IPsec VPNs
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies