Flylib.com
Pipes and Filters POSA
Previous page
Table of content
Next page
Pipes and Filters [POSA]
Channel the data through Pipes and process the stream in Filters.
Previous page
Table of content
Next page
Applying Domain-Driven Design and Patterns: With Examples in C# and .NET
ISBN: 0321268202
EAN: 2147483647
Year: 2006
Pages: 179
Authors:
Jimmy Nilsson
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Inside Network Security Assessment: Guarding Your IT Infrastructure
Security Requires Information Classification
Best Practices for Quantitative and Qualitative Risk Assessment
Making Sure You Are Ready to Begin
Ranking Your Findings
Procurement Best Practices
The CISSP and CAP Prep Guide: Platinum Edition
Security Architecture and Design
Operations Security
Appendix A Answers to Assessment Questions
Appendix B Glossary of Terms and Acronyms
Appendix F Security Control Catalog
Network Security Architectures
Attacker Types
Designing Your Security System
Network Design Refresher
Small Network Campus Security Design
Network Security Is a System
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Case #1 background: RailCo Ltd.
Business service layer
Service layer configuration scenarios
You mustUnderstand this
WS-MetadataExchange language basics
Java Concurrency in Practice
Guarding State with Locks
Synchronized Collections
Amdahls Law
Fairness
Choosing Between Synchronized and ReentrantLock
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies