Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 7: .NET Cryptographic Techniques
Table 7.1:
ProviderType
Value to
ProviderName
Value Correlation
Chapter 14: Win32 API Overview
Table 14.1: Common User Access Token Function Overview
Table 14.2: Common SID-Related Function Overview
Table 14.3: Security Descriptor Function Overview
Table 14.4:
ISecurityInformatio
n
Interface Member List
Table 14.5: Security Template Elements
Previous page
Table of content
Next page
.NET Development Security Solutions
ISBN: 0782142664
EAN: 2147483647
Year: 2003
Pages: 168
Authors:
John Paul Mueller
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Software Development Process Models
Reliability and Validity
The Exponential Model
Staged versus Continuous Debating Religion
Software Process Improvement Sequences
Oracle Developer Forms Techniques
Passing Data from the Called Form to the Calling Form
The Basics of Error-Message Handling
Object-oriented Methods in Forms
Summary
Creating a Tree Item
Programming Microsoft ASP.NET 3.5
Working with the Page
Web Forms User Controls
The HTTP Request Context
Data-Bound and Templated Controls
Hosting ASP.NET Outside IIS
GO! with Microsoft Office 2003 Brief (2nd Edition)
Summary
In this Chapter You Learned How to
Performance Assessments
Objective 4. Use Special Character Formats
Key Terms
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Querying WMI
Handling WMI Events
WMI Security
DNS & BIND Cookbook
Registering a Domain Name
Pointing a Domain Name to a Particular URL
Using rndc with a Remote Name Server
Protecting a Slave Name Server from Abuse
Returning Different Answers to Different Queriers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies