Flylib.com
Page #219 (List of Figures)
Previous page
Table of content
Chapter 3: History
Table 3.1: The 5 5 Tap Code Used by Prisoners in Vietnam
Chapter 8: Real-World Uses
Text to DNA Encryption Key
Previous page
Table of content
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220
Authors:
Gregory Kipper
BUY ON AMAZON
C & Data Structures (Charles River Media Computer Engineering)
The printf Function
Function
Union
Stacks and Queues
Linked Lists
Information Dashboard Design: The Effective Visual Communication of Data
Choosing a Deficient Measure
Highlighting Important Data Ineffectively or Not at All
Designing an Unattractive Visual Display
Visually Encoding Data for Rapid Perception
Test Your Design for Usability
Java Concurrency in Practice
Deadlock
Reducing Lock Contention
Complementary Testing Approaches
Explicit Locks
Atomic Variables and Nonblocking Synchronization
Python Standard Library (Nutshell Handbooks) with
The cStringIO Module
The fnmatch Module
The crypt Module
The grep Module
The reconvert Module
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Arrays and Collections
Multithreading
Windows Services
ADO.NET
Remoting and Enterprise Services
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Control Class Basics
Data Controls
Dynamic User Interface
GDI+ Basics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies