Flylib.com
↵
Network Security Architectures
Applied Knowledge Questions
Design Considerations
IP Telephony
Expected Threats
Security Will Become Computationally Less Expensive
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Part II - The Applications
Restructuring
Mergers and acquisitions
GO! with Microsoft Office 2003 Brief (2nd Edition)
Mastery Assessments
Objective 4. Construct a Formula and Use the Sum Function
Problem Solving
Chapter One. Using Access Data with Other Office Applications
Objective 3. Create a Table in Word from Excel Data
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Creating a Struts-based MVC Application
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
.NET System Management Services
Using the System.Management Namespace
Handling WMI Events
The WMI Schema
WMI Providers
WMI Security
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies