Flylib.com
Index_R
Previous page
Table of content
Next page
R
Reliability, 4546
Remote Method Invocation (RMI), 24142
Remote procedure call (RPC), 12
Resilience, 102
Risk assessment, 27582
areas of compromise, 278
bait and switch, 276
scenarios, 27677
Trojan horse, 276
RSA, 285
Keon, 290
SecurID, 284, 285, 29596
tokens, 296
See also
Security
Previous page
Table of content
Next page
Web Services[c] Theory and Practice
ISBN: 1555582826
EAN: N/A
Year: 2006
Pages: 113
BUY ON AMAZON
Java I/O
Buffers and Channels
How Object Serialization Works
Socket Channels
JFileChooser
Number Formats
Beginning Cryptography with Java
The JCA and the JCE
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Certificate Revocation and Path Validation
Appendix C Using the Bouncy Castle API for Elliptic Curve
SQL Tips & Techniques (Miscellaneous)
Using Data Control Language (DCL) to Setup Database Security
Working with Functions, Parameters, and Data Types
Working with SQL JOIN Statements and Other Multiple-table Queries
Understanding Transaction Isolation Levels and Concurrent Processing
Repairing and Maintaining MS-SQL Server Database Files
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Forming Your Kanban Team
Appendix A MRP vs. Kanban
Appendix D Organizational Changes Required for Kanban
Appendix G Intra-Cell Kanban
Appendix I Case Study 2: Rubber Extrusion Plant
Java Concurrency in Practice
Risks of Threads
Executing Tasks in Threads
AbstractQueuedSynchronizer
Nonblocking Algorithms
Summary
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Triggers
Running Operating System Commands
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies