Flylib.com
Index
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
Previous page
Table of content
Next page
Open Sources 2.0: The Continuing Evolution
ISBN: 0596008023
EAN: 2147483647
Year: 2004
Pages: 217
Authors:
Chris DiBona
,
Mark Stone
,
Danese Cooper
BUY ON AMAZON
Qshell for iSeries
The Exit Status and Decision-Making
Functions
Path-Name Expansion
Accessing OS/400-Specific Objects
Appendix B Qshell versus DOS
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Quantifying and Analyzing Activity Risks
Monitoring and Controlling Risky Projects
Closing Projects
Appendix A Selected Detail From the PERIL Database
Cisco CallManager Fundamentals (2nd Edition)
Circuit-Switched Systems
Route Patterns and Route Filters
Trunk Devices
Infrastructure Solutions
Application Protocols
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 15. Control Your Computer from Your Palm
Hack 23. Find All Available Wireless Networks
Hack 50. Interrogate the Network
Hack 70. Pebble
Section A.12. BSS Versus IBSS
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
.NET-A Complete Development Cycle
Initial Project Planning
Analysis of the GDI+ Extensions Requirements
Analysis of the Advanced GDI+ Extensions Requirements
Conclusion
Analyzing Interfaces and Activities
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies