Flylib.com
Extra Defensive Measures
Previous page
Table of content
Next page
There are no extra defensive measures to take.
Previous page
Table of content
Next page
Writing Secure Code
ISBN: 71626751
EAN: 2147483647
Year: 2003
Pages: 239
Authors:
Michael Howard
,
David LeBlanc
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Permissions
Lock Files
Multiplexing I/O with select
Peeking at Data
Scheduling Threads
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Assessing Business-IT Alignment Maturity
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
The Evolution of IT Governance at NB Power
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Authentication and Encryption Configuration Overview
Call Admission Control Between Clusters
Real-Time Monitoring Tool Overview
Network Security Architectures
Applied Knowledge Questions
FTP
IP Telephony
Design Evaluations
Postfix: The Definitive Guide
Unix Topics
Postfix Architecture
How qmgr Works
Mailing Lists
SASL Overview
101 Microsoft Visual Basic .NET Applications
Interacting with the Operating System
GDI+
COM Interop/PInvoke
Visual Studio .NET
Windows Server 2003 for .NET Developers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies