Flylib.com
↵
Assembly Language Programming
Computer Mathematics
AIX
C & C++ Windows Programming
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
SSL and TLS
High-Speed Signal Propagation[c] Advanced Black Magic
Dielectric Effects
Hierarchy of Regions
Linear Equalization: Long Backplane Trace Example
150- W STP-A Signal Propagation
IBIS: History and Future Direction
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Enforcing Strict Conformance to the C++ Standard
Reading a Comma-Separated Text File
Ensuring a Single Copy of a Member Variable
Extracting a File Extension from a String
Initializing Shared Resources Once
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 50. Interrogate the Network
Hack 51. Track Wireless Users
Hack 77. Manage Multiple AirPort Base Stations
Hack 86. Pirouette Can Waveguide
Section B.1. Microwave Cabling
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Quantitative Time Management
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
Comparing, Designing, and Deploying VPNs
VPN Devices
Review Questions
Deploying IPsec VPNs: Fundamental Considerations
Designing and Deploying IPsec Remote Access and Teleworker VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies