Flylib.com
K
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]
kill commands 2nd
Previous page
Table of content
Next page
RFID Sourcebook (paperback)
ISBN: 0132762021
EAN: 2147483647
Year: 2006
Pages: 100
Authors:
Sandip Lahiri
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Quantifying and Analyzing Project Risk
Managing Project Risk
Closing Projects
Conclusion
Software Configuration Management
Introduction to Software Configuration Management
Configuration Identification
Configuration Control
A Practical Approach to Documentation and Configuration Status Accounting
Configuration Management and Data Management
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Dynamic Library from the Command Line
Tokenizing a String
Finding the nth Instance of a Substring
Doing a Case-Insensitive String Comparison
Manipulating an XML Document
A Practitioners Guide to Software Test Design
The Testing Process
Equivalence Class Testing
Use Case Testing
Control Flow Testing
Scripted Testing
Java for RPG Programmers, 2nd Edition
Javas Language And Syntax
Data Types And Variables
User Interface
More Java
Appendix A Using Java on the AS/400
SQL Hacks
Hack 16. Search for a String Across Columns
Hack 36. Calculate the Distance Between GPS Locations
Hack 39. Apply a Progressive Tax
Hack 74. Compare and Synchronize Tables
Hack 80. Play Six Degrees of Kevin Bacon
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies