Flylib.com
Part III: Protect Your System
Previous page
Table of content
Next page
Chapter 6. Cryptography
Chapter 7. COTS
Chapter 8.
Privacy
Previous page
Table of content
Next page
Wireless Security and Privacy: Best Practices and Design Techniques
ISBN: 0201760347
EAN: 2147483647
Year: 2002
Pages: 73
Authors:
Tara M. Swaminatha
,
Charles R. Elden
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Core Agile Values
Agile Practices
Phase: Speculate
The Scaling Challenge
A Scaled Adaptive Framework
Interprocess Communications in Linux: The Nooks and Crannies
Library Functions
Summary
Summary
Introduction
Out of Band Messages
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Subqueries
Writing External Applications to Query and Manipulate Database Data
Working with Data BLOBs and Text
Working with Stored Procedures
Exploiting MS-SQL Server Built-in Stored Procedures
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT/JFace Mechanisms
Jump Start with SWT/JFace
SWT Event Handling, Threading, and Displays
Tables
Creating a Text Editor with JFace Text
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 33. Georeference an Arbitrary Tourist Map
Hack 40. Plot Points on a Spinning Globe Applet
Hack 45. Extract a Spatial Model from Wikipedia
Hack 55. Use Your Track Memory as a GPS Base Map
Hack 72. Add Relief to Your Topographic Maps
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
History of the Quartz Framework
Listening for Scheduler Events
Why RMI with Quartz?
Testing the RMI Server and Client
Quartz and Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies