Flylib.com
index_V
Previous page
Table of content
Next page
< Day Day Up >
Index
[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]
validation
values
values
constant
names , symbolic
validation
verification, Zip Code
< Day Day Up >
Previous page
Table of content
Next page
Prefactoring: Extreme Abstraction, Extreme Separation, Extreme Readability
ISBN: 0596008740
EAN: 2147483647
Year: 2005
Pages: 175
Authors:
Ken Pugh
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Distinguished Names and Certificates
Certificate Revocation and Path Validation
SSL and TLS
Appendix C Using the Bouncy Castle API for Elliptic Curve
A Practitioners Guide to Software Test Design
The Testing Process
Domain Analysis Testing
Control Flow Testing
Data Flow Testing
Defect Taxonomies
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 21. Track the International Space Station
Hack 24. Search for Events by Location
Hack 34. Publish Your Own Hiking Trail Maps
Hack 47. Geotag Your Own Photos on Flickr
Hack 61. Use the Right Developers Key Automatically
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 1. Start Internet Explorer and Identify Screen Elements
Summary
Objective 6. Copy Formulas
Performance Assessments
Mastery Assessments
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
DNS & BIND Cookbook
Finding Out Which Version of BIND Youre Running
Configuring a Name Server to Forward Dynamic Updates
Configuring DNS for Virtual Email Addresses
Testing a Name Servers Configuration
Limiting Concurrent TCP Clients
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies