Flylib.com
X
Previous page
Table of content
Next page
X.509 standard, 76
XP.
See
extreme programming
Previous page
Table of content
Next page
Software Requirement Patterns (Best Practices)
ISBN: 0735623988
EAN: 2147483647
Year: 2007
Pages: 110
Authors:
Stephen Withall
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
Data Structures and Algorithms in Java
Inheritance
Counting Steps
Ordered Lists
Contiguous Representation of Multidimensional Arrays
Vocabulary
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Architecture
Cisco Secure IDS
Snort
NFR Security
Policy and Procedures
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 35. Search Local, Find Global
Hacks 47-63
Hack 52. Show Your Waypoints on Aerial Photos with Terrabrowser
Hack 70. Import Your GPS Waypoints and Tracklogs into GRASS
Hack 97. Set Up an OpenGuide for Your Hometown
An Introduction to Design Patterns in C++ with Qt 4
C++ Introduction
Subobjects
QMainWindow and QSettings
Review Questions
Mp3PlayerView
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies