Flylib.com
Other Resources
Previous page
Table of content
Next page
Protocols for Authentication and Key Establishment
by Colin Boyd and Anish Mathuria (Springer, 2003)
Previous page
Table of content
Next page
Writing Secure Code
ISBN: 71626751
EAN: 2147483647
Year: 2003
Pages: 239
Authors:
Michael Howard
,
David LeBlanc
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Using the Shape Language to Retrieve Hierarchical Data
Overcoming Keyword Conflicts When Using CommandBuilders
Copying Rows from One DataTable to Another
Retrieving Column Default Values from SQL Server
Getting a SQL Server Query Plan
Java I/O
File Viewer, Part 1
Server Sockets
Buffered Streams
The Data Stream Classes
The java.io.Writer Class
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Working with Queries, Expressions, and Aggregate Functions
Performing Multiple-table Queries and Creating SQL Data Views
Working with Functions, Parameters, and Data Types
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
Constants, Variables, and Arrays
Processing Collections of Data
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
802.11 Wireless Networks: The Definitive Guide, Second Edition
11 Nomenclature and Design
Frame Transmission and Association and Authentication States
Spectrum Management
Characteristics of the OFDM PHY
ERP Physical Layer Convergence (PLCP)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Transmission Lines
IP QoS
The Next-Generation Network Infrastructure
End-to-End Optical Networking
Broadband PLT
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies