Flylib.com
How Hotspot Protection Works
Previous page
Table of content
Next page
Previous page
Table of content
Next page
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Introduction to Assessing Network Vulnerabilities
Foundations and Principles of Security
Risk-Assessment Methodologies
Choosing the Best Risk-Assessment Approach
Determining What Tools to Use
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Static Library Using Boost.Build
Partitioning a Range
Creating a Directory
Computing Variance, Standard Deviation, and Other Statistical Functions
Performing Arithmetic on Bitsets
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Common tangible benefits of SOA
Service descriptions (with WSDL)
Metadata exchange
Part III: SOA and Service-Orientation
Business service layer
Mastering Delphi 7
The Delphi Programming Language
The Run-Time Library
Writing Delphi Components
Multitier DataSnap Applications
Appendix C Free Companion Books on Delphi
Microsoft VBScript Professional Projects
Using Configuration Files to Control Script Execution
Maintaining a 30-Day Summary Log Archive
Project Case Study Creating a Centralized Report Management Station
Developing a Setup Script
Appendix A Windows XP Command Reference
VBScript in a Nutshell, 2nd Edition
What VBScript Is Used For: Gluing Together Objects
Error Handling
Windows Script Components
Writing Component Code
Section A.5. Data Type Conversion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies