Flylib.com
DynamicFontName
Previous page
Table of content
Next page
Page not found. Sorry. :(
Previous page
Table of content
Next page
Hackers Guide to Visual FoxPro 7.0
ISBN: 1930919220
EAN: 2147483647
Year: 2001
Pages: 899
Authors:
Tamar E. Granor
,
Ted Roche
,
Doug Hennig
,
Della Martin
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
SSL and TLS
Appendix A Solutions to Exercises
Documenting Software Architectures: Views and Beyond
Elements, Relations, and Properties of the Allocation Viewtype
Chunking Information: View Packets, Refinement, and Descriptive Completeness
Beyond Structure
Directory
Allocation Work Assignment View
Competency-Based Human Resource Management
Competency-Based HR Planning
Competency-Based Employee Recruitment and Selection
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Appendix C Examples of Life-Career Assessment Exercises
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
What this book does not cover
Common misperceptions about SOA
Common pitfalls of adopting SOA
Principles of Service-Orientation
Service interface design tools
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and Computers
Captology Looking Forward
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies