Flylib.com
Endnote Endnotes
Previous page
Table of content
Next page
Endnotes
5.
http://www.pedestalsoftware.com/products/se/.
Previous page
Table of content
Next page
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219
Authors:
Jesper M. Johansson
,
Steve Riley
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Cryptography
The Accreditation Phase
Appendix D The Information System Security Engineering Professional (ISSEP) Certification
Appendix F Security Control Catalog
Systematic Software Testing (Artech House Computer Library)
Analysis and Design
Test Implementation
The Test Organization
The Software Tester
Some Final Thoughts…
Managing Enterprise Systems with the Windows Script Host
Introduction
Regular Expressions
Internet Applications
Messaging Operations
Data Access
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
Captology Looking Forward
Comparing, Designing, and Deploying VPNs
Review Questions
Understanding the Operation of SSL Remote Access VPNs
Summary
Designing and Building SSL Remote Access VPNs (WebVPN)
Python Standard Library (Nutshell Handbooks) with
Data Representation
The base64 Module
The sgmllib Module
The tabnanny Module
The readline Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies