Flylib.com
Appendix C. Technical Acronyms Used in This Book
Previous page
Table of content
Next page
< Day Day Up >
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
< Day Day Up >
Previous page
Table of content
Next page
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164
Authors:
Marco Pistoia
,
Nataraj Nagaratnam
,
Larry Koved
,
Anthony Nadalin
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Displaying Columns from a Related DataTable
Retrieving Constraints from a SQL Server Database
Performing a Bulk Insert with SQL Server
Counting Records
Creating a New SQL Server Database
ERP and Data Warehousing in Organizations: Issues and Challenges
The Second Wave ERP Market: An Australian Viewpoint
Distributed Data Warehouse for Geo-spatial Services
Healthcare Information: From Administrative to Practice Databases
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Certificate Revocation and Path Validation
Appendix A Solutions to Exercises
Certified Ethical Hacker Exam Prep
Summary
Intrusion Detection Systems
Study Strategies
Public Key Infrastructure
Exam Simulation
The Complete Cisco VPN Configuration Guide
Encryption
IPsec Traffic and Networks
SSL Overview
Windows Software Client
ISAKMP/IKE Phase 2 Data Connections
Python Programming for the Absolute Beginner, 3rd Edition
Telling the Monkeys What to Do
Toplevel Windows
Other Client-Side Tools
Conclusion Python and the Development Cycle
The Gilligan Factor
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies