Flylib.com
Index_X
Previous page
Table of content
Next page
X
XML elements of JDO metadata, 168–181
XOR (^) operator, 53
Previous page
Table of content
Next page
Using and Understanding Java Data Objects
ISBN: 1590590430
EAN: 2147483647
Year: 2005
Pages: 156
Authors:
David Ezzio
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
A Practical Approach to Configuration Verification and Audit
Appendix E Test Plan
Appendix Q Problem Trouble Report (PTR)
Appendix W Physical Configuration Audit (PCA) Checklist
FileMaker Pro 8: The Missing Manual
Creating Layouts for Reports
Table Occurrences
Logical Functions
Go to Layout
Tooltips
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Satellite
The PSTN
The OSI Reference Model and the TCP/IP Reference Model
Antennas
2G: Digital Cellular Radio
Special Edition Using FileMaker 8
Working with Field Types
FileMaker Extra: Complex Many-to-Many Relationships
Working with Lists of Data
Configuring and Administering FileMaker Server Using the SAT
Scheduled Tasks
Comparing, Designing, and Deploying VPNs
Designing QoS for IPsec VPNs
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Summary
Designing and Building SSL Remote Access VPNs (WebVPN)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies