Flylib.com
Index_I
Previous page
Table of content
Next page
I
identification-based trust 90
identify theft 11
identification of scope 79
information architecture 96
information assets 4
information assurance 22, 56
information loss 10
information security 34, 96
information systems 4
information transfer 9
infrastructure security plan 60
instant messaging (IM) 34
integrity 122
internal threat 54, 102
Internet protocol (IP) 3
Internet- related fraud 10
intrusion detection systems (IDS) 64
ISO security architecture 21
IT risk management 67
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
MySQL Stored Procedure Programming
Calling Stored Programs from Stored Programs
Using MySQL Stored Programs with Java
Stored Programs and J2EE Applications
Execution Mode Options for Stored Programs
Conditional Logic
Mapping Hacks: Tips & Tools for Electronic Cartography
Hacks 14-21
Hacks 64-77
Hack 65. Extract Data from Maps with Manifold
Hack 84. Build a Free World Gazetteer
Hack 95. Model Interactive Spaces
Extending and Embedding PHP
Data Values
Compiling on Win32
Userspace Superglobals
Summary
Linked Lists
.NET-A Complete Development Cycle
The Initial Use Case Model
Initial Project Planning
Design of the Photo Editor Application
References for Further Reading
Putting It All Together
GDI+ Programming with C#
GDI+ from a GDI Perspective
Some Basic GDI+ Objects
Graphics Class Methods
Working with Fonts
The Rectangle Structure
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Files and Directories
Windows Controls
Web Services
Remoting and Enterprise Services
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies