Flylib.com
How Intrusion Protection Systems Work
Previous page
Table of content
Next page
Previous page
Table of content
Next page
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Mapping ORM Models to Logical Database Models
Generating a Physical Database Schema
Editing Logical Models”Advanced Aspects
Other Features and Best Practices
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Monitoring Connections
Filtering and Sorting Data
Exporting the Results of a Query to an Array
Reading and Writing Binary Data with SQL Server
A.5. Class, Structure, and Interface Members
SQL Tips & Techniques (Miscellaneous)
Using Data Control Language (DCL) to Setup Database Security
Understanding Transaction Isolation Levels and Concurrent Processing
Working with Ms-sql Server Information Schema View
Writing Advanced Queries and Subqueries
Exploiting MS-SQL Server Built-in Stored Procedures
Developing Tablet PC Applications (Charles River Media Programming)
Working with VB .NET
Strings, GDI+, and Error Handling in VB .NET
Obtaining the Tablet PC SDK
Creating an MP3 Player
Speech Input with SAPI
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Parts of a Computer System
String Operations
Floating-Point Arithmetic
Decimal Arithmetic
MySQL Cookbook
Protecting Option Files
Using mysql in Shell Scripts
Finding the Day of the Week for a Date
Deleting Related Rows in Multiple Tables
Eliminating Duplicates from a Table
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies