Flylib.com
Part V: Appendixes
Previous page
Table of content
Next page
only for RuBoard - do not distribute or recompile
Part V: Appendixes
only for RuBoard - do not distribute or recompile
Previous page
Table of content
Next page
Visual Basic Shell Programming
ISBN: B00007FY99
EAN: N/A
Year: 2000
Pages: 128
Authors:
J. P. Hamilton
,
Ron Petrusha
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Reverse Engineering and Importing to ORM
Conceptual Model Reports
Editing Logical Models”Intermediate Aspects
Other Features and Best Practices
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Basic Graphics Commands
Adding Sound Effects to Your Game
Loading and Saving Information Using Files
Epilogue
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Conclusion
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Working with Functions, Parameters, and Data Types
Working with SQL JOIN Statements and Other Multiple-table Queries
Working with Ms-sql Server Information Schema View
Working with SQL Database Data Across the Internet
SQL Hacks
Hack 46. Store Images in a Database
Hack 58. Store Parameters in the Database
Hack 75. Minimize Bandwidth in One-to-Many Joins
Reporting
Hack 96. Create an Audit Trail
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Unauthorized Activity II
Tcpdump
NFR Security
Policy and Procedures
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies