Flylib.com
A
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
*-property (star property) 2nd
1 x 1 GIF [See Web bugs.]
12-step password attacks 2nd
802.11 (wireless) standards 2nd 3rd 4th
Previous page
Table of content
Next page
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
SSL and TLS
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Governance in IT Outsourcing Partnerships
Governance Structures for IT in the Health Care Industry
WebLogic: The Definitive Guide
Introduction
Using JNDI in a Clustered Environment
Using the Resource Adapter
WebLogics Classloading Framework
UDDI
C++ How to Program (5th Edition)
(Optional) Software Engineering Case Study: Collaboration Among Objects in the ATM System
Terminology
protected Members
Terminology
L.2. Breakpoints and the Continue Command
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Processing Collections of Data
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Ways to Customize Word
Part Three. Office Programming in VSTO
Using Windows Forms in VSTO
Conclusion
The XML Options Dialog
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies