Flylib.com
9.11 Bibliography
Previous page
Table of content
Next page
9.11
Bibliography
Intelligent Enterprise
(
May 28,
2002
),
"The Hidden Truth."
Previous page
Table of content
Next page
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
What Security Is and Isnt
Four Ways in Which You Can Respond to Risk
Understanding the IT Security Process
Quantitative and Qualitative Risk-Assessment Approaches
General Security Websites
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Working with Queries, Expressions, and Aggregate Functions
Working with Comparison Predicates and Grouped Queries
Understanding Transaction Isolation Levels and Concurrent Processing
Repairing and Maintaining MS-SQL Server Database Files
Ruby Cookbook (Cookbooks (OReilly))
Listing a Directory
Converting HTML Documents from the Web into Text
Automatically Generating Documentation
Calling a C Library Through SWIG
Deleting Files That Match a Regular Expression
InDesign Type: Professional Typography with Adobe InDesign CS2
Metrics Kerning
The Glyphs Palette
Footnotes
Up Next
Type Effects
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #1 Lockheed Martin Creating a New Legacy
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Phase 1 Readiness Assessment
Service Process Challenges
Using DMAIC to Improve Service Processes
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Querying WMI
The WMI Schema
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies