Flylib.com
How Spammers Hide Their Identity
Previous page
Table of content
Next page
Previous page
Table of content
Next page
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
Software Configuration Management
Project Management in a CM Environment
A Practical Approach to Configuration Verification and Audit
Appendix D Problem Change Report
Appendix J Document Change Request (DCR)
Appendix U Acronyms and Glossary
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Training
Appendix A MRP vs. Kanban
Appendix B Kanban Supermarkets
Appendix D Organizational Changes Required for Kanban
Appendix I Case Study 2: Rubber Extrusion Plant
Oracle Developer Forms Techniques
Advanced GUI Development: Developing Beyond GUI
Base Tables
Summary
Polymorphism
Shrinking Trees
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Simple Hello, World Application from the Command Line
Specifying a Runtime Library Variant
Creating a Directory
Finding the Greatest or Least Value in a Container
Parsing a Complex XML Document
A Practitioners Guide to Software Test Design
The Testing Process
Equivalence Class Testing
Defect Taxonomies
When to Stop Testing
Appendix B Stateless University Registration System Case Study
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies