Flylib.com
Section 24.6. Acknowledgments
Previous page
Table of content
Next page
24.6. Acknowledgments
This work was funded, in part, by NSF Award IIS-0325035.
Previous page
Table of content
Next page
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295
Authors:
Lorrie Faith Cranor
,
Simson Garfinkel
BUY ON AMAZON
Beginning Cryptography with Java
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Metrics and Models in Software Quality Engineering (2nd Edition)
Total Quality Management
Reliability and Predictive Validity
In-Process Metrics and Reports
Measuring Levels Is Not Enough
Measuring Process Improvements at Activity Levels
The .NET Developers Guide to Directory Services Programming
Introduction to LDAP and Active Directory
Optimizing Search Performance
Reading and Writing LDAP Attributes
Choosing an Object Class
The Reflection Method
Software Configuration Management
Introduction to Software Configuration Management
Configuration Status Accounting
CM Automation
Appendix L Software Requirements Changes
Appendix M Problem Report (PR)
Building Web Applications with UML (2nd Edition)
JavaScript Objects
Glossary
Designing Web Applications
Discussion
Implementation
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Object Models
Working with Excel Objects
The VSTO Programming Model
VSTO Extensions to the Word and Excel Object Models
Properties Merged from OLEObject or OLEControl
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies