Flylib.com
Index_D
Previous page
Table of content
Next page
D
decentralization, 31, 34
Delhi, 12
Deloitte Consulting, 238
developers
movement of, 117, 212
shortage of, 54, 56
work preferences, 6 “7
see also
attrition and immigration
dialectic, 124 “6
disembedding mechanism, 31 “2, 36, 206, 213, 231
domain-focused service model, 182 “3, 185
Dublin, 12
Previous page
Table of content
Next page
Global IT Outsourcing: Software Development across Borders
ISBN: 0521039487
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Sundeep Sahay
,
Brian Nicholson
,
S. Krishna
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk-Assessment Terminology
Best Practices for Quantitative and Qualitative Risk Assessment
Common Risk-Assessment Methodologies and Templates
Determining the Next Step
Notice
Snort Cookbook
Logging in Binary
Testing Rules
Suppressing Rules
Decoding Application Traffic
Writing Output Plug-ins
Network Security Architectures
Instant Messaging
Identity Technology Guidelines
References
Appendix A. Glossary of Terms
802.11 Wireless Networks: The Definitive Guide, Second Edition
1X on Wireless LANs
Management Operations
Frequency-Hopping Transmission
Ensuring Secrecy Through Encryption
Tunable 802.11 Parameters
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Worksheets, Charts, and Sheets Collections
Working with Document Properties
Advanced ADO.NET Data Binding: Looking Behind the Scenes
Creating Setup Packages
Exporting the Mapped XML in the Document to an XML Data File
DNS & BIND Cookbook
Registering Name Servers
Storing the Location of a Host in DNS
Determining the Order in Which a Name Server Returns Answers
Securing Zone Transfers
Adding a Host with an IPv6 Interface
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies