Flylib.com
Index
Previous page
Table of content
Next page
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]
Previous page
Table of content
Next page
The Software Development Edge(c) Essays on Managing Successful Projects
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 269
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT/JFace Mechanisms
JFace Windows and Dialogs
Eclipse Forms
Drawing Diagrams with Draw2D
Sample Application
Network Security Architectures
What Is a Security Policy?
References
Medium Network Edge Security Design
High-End Resilient Edge Security Design
Organizational Realities
A Practitioners Guide to Software Test Design
Decision Table Testing
Use Case Testing
Control Flow Testing
Defect Taxonomies
Appendix A Brown & Donaldson Case Study
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 4. UPDATE the Database
Hack 7. Modify a Schema Without Breaking Existing Queries
Hack 26. Include the Rows Your JOIN Forgot
Hack 35. Tally Results into a Chart
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 27. Detect Networks on Mac OS X
Hack 34. grep Your Network
Hack 81. Use a Windows-Only Wireless Card in Linux
Hack 91. The Passive Repeater
Section A.4. 802.11g: Like 802.11b, only Faster
Extending and Embedding PHP
Memory
Building PHP
Arg Info and Type-hinting
Inspection
Streams API
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies