Flylib.com
Part II: Working with Compatibility
Previous page
Table of content
Next page
Chapter List
Chapter 4: Managing Software
Chapter 5: Communicating Online
Chapter 6: Collaborating
Previous page
Table of content
Next page
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Java I/O
Output Streams
Compressing and Decompressing Streams
Selectors
Readers and Writers
Sockets
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
SSL and TLS
Snort Cookbook
Installing Snort on Solaris
Logging in Binary
Thresholding Alerts
Detecting Port Scans and Talkative Hosts
Generating Text-Based Log Analysis
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Detailed Test Planning
Test Execution
The Test Manager
Appendix F Process Diagrams
MySQL Cookbook
Recording a Rows Creation Time
Handling Duplicate Index Values
Determining Whether to Resequence a Column
Assigning Ranks
Introduction
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Credibility and Computers
The Ethics of Persuasive Technology
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies