Flylib.com
How Trojan Horses Work
Previous page
Table of content
Next page
Previous page
Table of content
Next page
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Planning for Risk Management
Identifying Project Resource Risk
Quantifying and Analyzing Activity Risks
Conclusion
Building Web Applications with UML (2nd Edition)
Role of Modeling
Glossary
The Use Case Model
Design
Requirements and Use Case Model
Data Structures and Algorithms in Java
List Nodes
Vocabulary
Analysis of Algorithms
Projects
B. Unified Modeling Language
MySQL Cookbook
Specifying Queries on the Command Line
Introduction
Controlling Case Sensitivity of String Sorts
Converting Two-Digit Year Values to Four-Digit Form
Storing Images or Other Binary Data
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 18. Examine Patterns of Criminal Activity
Hack 38. Map Your Wardriving Expeditions
Hack 50. Geoblog with Google Maps in Thingster
Hack 56. Pin Your Own Maps to Google Maps with TPhoto
Hack 64. Build Custom Icons on the Fly
Programming Microsoft ASP.NET 3.5
Creating Bindable Grids of Data
Real-World Data Access
Working with the File System
Extending Existing ASP.NET Controls
Index
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies