Flylib.com
PartV.Protecting Hosts
Previous page
Table of content
Next page
Chapter 12
Server and Client Hardening
Previous page
Table of content
Next page
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219
Authors:
Jesper M. Johansson
,
Steve Riley
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Context Management of ERP Processes in Virtual Communities
Distributed Data Warehouse for Geo-spatial Services
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
A Hybrid Clustering Technique to Improve Patient Data Quality
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Tables
Drag and Drop and the Clipboard
JFace Windows and Dialogs
Creating a Text Editor with JFace Text
Eclipse Forms
Information Dashboard Design: The Effective Visual Communication of Data
Variations in Dashboard Uses and Data
Encoding Quantitative Data Inaccurately
Tapping into the Power of Visual Perception
Make the Viewing Experience Aesthetically Pleasing
Sample Sales Dashboard
Programming .Net Windows Applications
PictureBox
Date and Time Values
Managed Providers
Binding Data
Exceptions
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Oracle and PL/SQL
Defeating Virtual Private Databases
Appendix A Default Usernames and Passwords
Understanding Digital Signal Processing (2nd Edition)
THE DFT FREQUENCY RESPONSE TO A REAL COSINE INPUT
IMPULSE RESPONSE OF A HILBERT TRANSFORMER
THE SLIDING DFT
EFFICIENT POLYNOMIAL EVALUATION
DESIGNING VERY HIGH-ORDER FIR FILTERS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies