Flylib.com
Q
Previous page
Table of content
Next page
quality assurance, 66, 67
Previous page
Table of content
Next page
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
IT Project Management Overview
Project Initiation
Scope Planning
Comprehensive Project Plan
Project Closure
Interprocess Communications in Linux: The Nooks and Crannies
Permissions
Encoding and Decoding Arbitrary Data Types
Sockets: The Connectionless Paradigm
Out of Band Messages
Thread Synchronization
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Cisco 7905G and 7912G IP Phones
Implementing Shared Lines and Hunt Groups
Paging
Customizing the Cisco UE AA
Appendix A. Cisco IPC Express Features, Releases, and Ordering Information
WebLogic: The Definitive Guide
Managing WebLogic JTA
Securing a Clustered Solution
Machines, Replication Groups, and Failover
The Security Provider Architecture
Monitor MBeans
MySQL Clustering
Retrieving the Latest Snapshot from BitKeeper
Running MySQL in a Chrooted Environment
MySQL Cluster Performance
Individual Programs
Logging Commands
DNS & BIND Cookbook
Making the Domain Name of Your Zone Point to Your Web Server
Making Your Services Easy to Find
Protecting a Slave Name Server from Abuse
Testing a Name Servers Configuration
Configuring an Authoritative-Only Name Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies