Flylib.com
N
Previous page
Table of content
Next page
Team-Fly
SyncML®: Synchronizing and Managing Your Mobile Data
By Uwe Hansmann, Riku Mettälä, Apratim Purakayastha, Peter Thompson, Phillipe Kahn
Table of Contents
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]
Name Space 2nd
Next 2nd
NextNonce 2nd 3rd 4th
Nokia
Nonce 2nd
NoResp
NumberOfChanges
Team-Fly
Top
Previous page
Table of content
Next page
SyncML: Synchronizing and Managing Your Mobile Data
ISBN: 0130093696
EAN: 2147483647
Year: 2001
Pages: 124
Authors:
Uwe Hansmann
,
Riku Mettala
,
Apratim Purakayastha
,
Peter Thompson
BUY ON AMAZON
Building Web Applications with UML (2nd Edition)
Architecture Elaboration
HTML Frames
Overview
UML to HTML
Software Architecture Document
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Tcpdump
IDS and IPS Internals
Security Business Issues
The Future of Intrusion Detection and Prevention
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 4. Find Your House on an Aerial Photograph
Hack 37. Tweak the Look and Feel of Web Maps
Hack 44. Plot Statistics Against Shapes
How GPS Works
Hack 61. Build a Map of Local GSM Cells
Web Systems Design and Online Consumer Behavior
Chapter VIII Personalization Systems and Their Deployment as Web Site Interface Design Decisions
Chapter XII Web Design and E-Commerce
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Chapter XVII Internet Markets and E-Loyalty
.NET-A Complete Development Cycle
Evaluating .NET for Windows Client Applications
The Detailed Project Schedule
Design of the Advanced GDI+ Extensions
Conclusion
Integration Test
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Triggers
Defeating Virtual Private Databases
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies