Flylib.com
How Spyware Morphs Itself to Escape Detection
Previous page
Table of content
Next page
Previous page
Table of content
Next page
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Library Functions
Executable File Format
Unnamed Pipes
Message Queue Control
A.1. Manual Page Sections
Beginning Cryptography with Java
Symmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Certificate Revocation and Path Validation
Appendix C Using the Bouncy Castle API for Elliptic Curve
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Team change
Part II - The Applications
Restructuring
Mergers and acquisitions
IT-based process change
101 Microsoft Visual Basic .NET Applications
Building Web Applications
GDI+
Building Enterprise Services Applications
Visual Studio .NET
Securing Applications
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Templates and Velocity
Creating a Search Engine with Lucene
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Making Quantitative Decisions
Expense Accounting and Earned Value
Special Topics in Quantitative Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies