Flylib.com
Other Resources
Previous page
Table of content
Next page
Protocols for Authentication and Key Establishment
by Colin Boyd and Anish Mathuria (Springer, 2003)
Previous page
Table of content
Next page
Writing Secure Code
ISBN: 71626751
EAN: 2147483647
Year: 2003
Pages: 239
Authors:
Michael Howard
,
David LeBlanc
BUY ON AMAZON
Java I/O
Marking and Resetting
Performance
JavaDoc
The Architecture of the Java Communications API
The Local Device
CISSP Exam Cram 2
A Note from Series Editor Ed Tittel
Introduction
Equipment Life Cycle
Computer System Architecture
Software-Development Methods
WebLogic: The Definitive Guide
Configuring WebLogics HTTP Server
Deployment Tools
Deployment Considerations
JAAS Authentication in a Client
Accessing MBeans
An Introduction to Design Patterns in C++ with Qt 4
tr() and Internationalization
Summary: QProcess and QThread
Creational Patterns
Virtual Pointers and Virtual Tables
Testing Mp3File Related Classes
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
The Ethics of Persuasive Technology
Captology Looking Forward
File System Forensic Analysis
File System Category
Metadata Category
Index Attributes and Data Structures
Metadata Category
The Big Picture
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies