Flylib.com
How Instant Messaging Works
Previous page
Table of content
Next page
Previous page
Table of content
Next page
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
CISSP Exam Cram 2
LAW, INVESTIGATIONS, AND ETHICS
Telecommunications and Network Security
Network Models and Standards
Software-Development Methods
Operations Security
Documenting Software Architectures: Views and Beyond
Using Context Diagrams
Overview
What to Document
Volume I ECS Software Architecture Documentation Beyond Views
Allocation Implementation View
SQL Hacks
Hack 2. Connect to SQL from a Program
Date Handling
Hack 28. Avoid Dividing by Zero
Hack 42. Present Data Graphically Using SVG
Hack 60. Create a List of Personalized Parameters
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Team change
Organizational change
Restructuring
IT-based process change
The Java Tutorial: A Short Course on the Basics, 4th Edition
About the Java Technology
How Will Java Technology Change My Life?
Overview of I/O Streams
Swing-Based Applets
Operator Precedence
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Voice of the Customer (VOC)
Descriptive Statistics and Data Displays
Variation Analysis
Identifying and Verifying Causes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies