Flylib.com
Index_J
Previous page
Table of content
Next page
< Day Day Up >
J
joining groups 268
< Day Day Up >
Previous page
Table of content
Next page
Linux Clustering With Csm and Gpfs
ISBN: 073849870X
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
IBM Redbooks
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix A Solutions to Exercises
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Measuring ROI in E-Commerce Applications: Analysis to Action
Managing IT Functions
Governing Information Technology Through COBIT
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Part II - The Applications
Mergers and acquisitions
Cultural change
Cisco Voice Gateways and Gatekeepers
Deployment Scenarios
H.323 Specifications
H.323 Network Components
Connecting to the PSTN
Case Study
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 22. Map Wi-Fi Networks with Kismet and GPSd
Hack 67. Upgrade Your Wireless Router
Section A.7. 900 MHz: Low Speed, Better Coverage
Section B.2. Microwave Connector Reference
Section B.5. 802.11 Hardware Suppliers
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies