Flylib.com
Index
Previous page
Table of content
Next page
A
access control mechanisms 64
access point 112
administrative security policies 35
antivirus protection software 63
authentication 3, 122
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
The Waterfall Development Model
Fundamentals of Measurement Theory
A Proposed Software Project Assessment Method
Software Process Improvement Sequences
Measuring Process Improvements at Activity Levels
The .NET Developers Guide to Directory Services Programming
Directory Synchronization Queries
LDAP Data Types in .NET
Summary
Managing Passwords for ADAM Users
Authentication Using SDS.P
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Training
Auditing the Kanban
Conclusion
Appendix E EOQ vs. Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity I
NFR Security
Security Business Issues
The Future of Intrusion Detection and Prevention
Mastering Delphi 7
The Delphi Programming Language
Working with Forms
Working with ADO
Web Services and SOAP
Appendix A Extra Delphi Tools by the Author
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter XII Web Design and E-Commerce
Chapter XIV Product Catalog and Shopping Cart Effective Design
Chapter XVII Internet Markets and E-Loyalty
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies