Flylib.com
Chapter 37. Automatically Generating Mock Objects
Previous page
Table of content
Next page
Asim Jalis and Lance Kind
Copyright © 2003, Asim Jalis and Lance Kind. All rights reserved.
Previous page
Table of content
Next page
Extreme Programming Perspectives
ISBN: 0201770059
EAN: 2147483647
Year: 2005
Pages: 445
Authors:
Michele Marchesi
,
Giancarlo Succi
,
Don Wells
,
Laurie Williams
,
James Donovan Wells
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Asymmetric Key Cryptography
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix A Solutions to Exercises
CISSP Exam Cram 2
TELECOMMUNICATIONS AND NETWORK SECURITY
Building Defense in Depth
Threats Against Access Control
Identification, Authentication, and Authorization
Business Continuity Plan (BCP)
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Scope Risk
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Cisco CallManager User Database
Summary
Review Questions
Encryption
Summary
VBScript in a Nutshell, 2nd Edition
How ASP Works
Section A.17. Variable Declaration
Section B.8. String Constants
Appendix E. The Script Encoder
Section E.1. How Encoding and Decoding Works
FileMaker 8 Functions and Scripts Desk Reference
Get(SystemLanguage)
GetAsText()
IsValid()
Upper()
WindowNames
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies