Flylib.com
↵
Assembly Language Programming
Computer Mathematics
AIX
C & C++ Windows Programming
Beginning Cryptography with Java
Symmetric Key Cryptography
Object Description in Cryptography Using ASN.1
CMS and S/MIME
SSL and TLS
Appendix C Using the Bouncy Castle API for Elliptic Curve
Inside Network Security Assessment: Guarding Your IT Infrastructure
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Understanding the Attacker
Introducing the Assessment Process
Tools Used for Assessments and Evaluations
Post-Assessment Activities
Software Configuration Management
A Practical Approach to Configuration Verification and Audit
Configuration Management and Software Engineering Standards Reference
Appendix I System Service Request
Appendix K Problem/Change Report
Appendix V Functional Configuration Audit (FCA) Checklist
Cisco IOS Cookbook (Cookbooks (OReilly))
Backing Up Router Configurations
Sample Server Configuration Files
Using RSVP
Foreign Agent Configuration
Manually Configuring IPv6 Addresses on an Interface
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
.NET-A Complete Development Cycle
The Photo Editor Application
Conclusion
Multithreading and Optimization Implementation
Breakdown of the Code Modules
Deployment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies