Flylib.com
↵
Assembly Language Programming
Computer Mathematics
AIX
C & C++ Windows Programming
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Section II - White Box Testing Techniques
Section IV - Supporting Technologies
Defect Taxonomies
When to Stop Testing
C & Data Structures (Charles River Media Computer Engineering)
C Operators
Preprocessing
Files
Problems in Stacks and Queues
Problems in Graphs
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 13. Remote Control Windows with Bluetooth Phones and PDAs
Hack 49. Poll Wireless Clients
Hack 60. Backlight Your Zipit
Hacks 8393: Introduction
Hack 86. Pirouette Can Waveguide
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Social Actors
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Introduction to Network Security
HTTP
Sun RPC
Deployment Scenarios
Summary
Programming .Net Windows Applications
Events
Controls: The Base Class
Containers
Up-Down Controls
ADO.NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies