Flylib.com
Index
Previous page
Table of content
Next page
< Day Day Up >
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]
< Day Day Up >
Previous page
Table of content
Next page
Prefactoring: Extreme Abstraction, Extreme Separation, Extreme Readability
ISBN: 0596008740
EAN: 2147483647
Year: 2005
Pages: 175
Authors:
Ken Pugh
BUY ON AMAZON
Project Management JumpStart
Building the Foundation
Developing Project Management Skills
Assessing Risk
Budgeting 101
Controlling the Project Outcome
Inside Network Security Assessment: Guarding Your IT Infrastructure
Security Requires Information Classification
Risk Assessment Best Practices
Contents of a Good Report
Determining the Next Step
Vulnerability Management
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
A Practical Approach to Configuration Verification and Audit
Appendix G Sample Inspection Plan
Appendix M Problem Report (PR)
Appendix X SCM Guidance for Achieving the Repeatable Level on the Software
Java How to Program (6th Edition) (How to Program (Deitel))
Examples Using the for Statement
Summary
Terminology
Fractals
Wrap-Up
Cisco Voice Gateways and Gatekeepers
Chapter Review Questions
H.323 Protocol Pros and Cons
Review Questions
Basic Configuration
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Querying WMI
Instrumenting .NET Applications with WMI
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies