Flylib.com
How Trojan Horses Work
Previous page
Table of content
Next page
Previous page
Table of content
Next page
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
Context Management of ERP Processes in Virtual Communities
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
A Hybrid Clustering Technique to Improve Patient Data Quality
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Beginning Cryptography with Java
The JCA and the JCE
Certificate Revocation and Path Validation
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
The CISSP and CAP Prep Guide: Platinum Edition
Cryptography
Security Architecture and Design
The Accreditation Phase
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Appendix F Security Control Catalog
A Practitioners Guide to Software Test Design
The Testing Process
Equivalence Class Testing
Decision Table Testing
Domain Analysis Testing
Appendix B Stateless University Registration System Case Study
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
Exaggeration Equals Characterization
Color, Light, and Focus
Atmosphere, Film, and Noise Effects
Appendix Adobe Photoshop and After Effects Resources
MPLS Configuration on Cisco IOS Software
VPN Categories
Case Study-Hub and Spoke MPLS VPN Network with Sites Using Same AS Numbers
Command Reference
MPLS TE Theory
Command Reference
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies