Flylib.com
Index_H
Previous page
Table of content
Next page
H
Hash code, 377
Hash functions, 377-79
defined, 377
proposed, 378
requirements, 377-78
Previous page
Table of content
Next page
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Security and the Employee (Social Engineering)
Why Risk Assessment
Level III Assessments
IT Security Architecture and Framework
Appendix C. Security Assessment Sample Report
MySQL Clustering
MySQL Clusters Native Backup Tool
Indexes
Query Execution
Data Retrieval in MySQL Cluster
Common Setups
Mastering Delphi 7
Delphi 7 and Its IDE
Visual Controls
Building the User Interface
Web Programming with WebBroker and WebSnap
Using XML Technologies
.NET-A Complete Development Cycle
Design of the Photo Editor Application
Unit Tests
Conclusion
References for Further Reading
References for Further Reading
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Oracle and PL/SQL
Triggers
Accessing the File System
DNS & BIND Cookbook
Configuring a Name Server as the Primary Master for a Zone
Configuring a Name Server to Forward Some Queries to Other Name Servers
Configuring IXFR
Running a Name Server in a chroot( ) Jail
Sending syslog Output to Another Host
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies