Flylib.com
Index
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]
Previous page
Table of content
Next page
Inside Network Perimeter Security (2nd Edition)
ISBN: 0672327376
EAN: 2147483647
Year: 2005
Pages: 230
Authors:
Stephen Northcutt
,
Lenny Zeltser
,
Scott Winters
,
Karen Kent
,
Ronald W. Ritchey
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Database Modeling
Object Types, Predicates, and Basic Constraints
Conceptual Model Reports
Reverse Engineering Physical Schemas to Logical Models
SQL Hacks
Hack 25. Keep a Running Total
Hack 36. Calculate the Distance Between GPS Locations
Hack 45. Process Web Server Logs
Hack 48. Prevent an SQL Injection Attack
Sharing Data Across the Internet
Data Structures and Algorithms in Java
Problems
Vocabulary
Summary
Summary
Vocabulary
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Java Concurrency in Practice
Atomicity
Part II: Structuring Concurrent Applications
Short-running GUI Tasks
Other Liveness Hazards
Amdahls Law
Python Programming for the Absolute Beginner, 3rd Edition
Roses Are Red, Violets Are Blue; Lists Are Mutable, and So Is Class Foo
Data Structures Versus Python Built-ins
Part V: Integration
Enter Python
On Sinking the Titanic
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies