Flylib.com
Index_R
Previous page
Table of content
Next page
R
Reliability, 4546
Remote Method Invocation (RMI), 24142
Remote procedure call (RPC), 12
Resilience, 102
Risk assessment, 27582
areas of compromise, 278
bait and switch, 276
scenarios, 27677
Trojan horse, 276
RSA, 285
Keon, 290
SecurID, 284, 285, 29596
tokens, 296
See also
Security
Previous page
Table of content
Next page
Web Services[c] Theory and Practice
ISBN: 1555582826
EAN: N/A
Year: 2006
Pages: 113
BUY ON AMAZON
Java I/O
Numeric Data
Character Data
USB Architecture
Controlling Devices
The Generic Connection Framework
Snort Cookbook
Capturing and Viewing Packets
Detecting Malware
Securing ACID
Generating Text-Based Log Analysis
Snort as a Virus Detection Tool
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Executing Scripts
Generating the Entire Page
Table Constraints
Validating and Parsing User Input
Using EXPLAIN PLAN
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Voice of the Customer (VOC)
Data Collection
Variation Analysis
Identifying and Verifying Causes
Reducing Lead Time and Non-Value-Add Cost
Java Concurrency in Practice
Publication and Escape
Immutability
Finding Exploitable Parallelism
Why are GUIs Single-threaded?
Shared Data Models
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies