Flylib.com
Y
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
Yan, Jeff
Previous page
Table of content
Next page
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295
Authors:
Lorrie Faith Cranor
,
Simson Garfinkel
BUY ON AMAZON
Java I/O
Writing Bytes to Output Streams
Skipping Bytes
File Viewer, Part 1
URL Connections
Thread Safety
Project Management JumpStart
Building the Foundation
Breaking Down the Project Activities
Assessing Risk
Executing the Project
Controlling the Project Outcome
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Transactions and Transaction Logs
Performing Multiple-table Queries and Creating SQL Data Views
Working with SQL JOIN Statements and Other Multiple-table Queries
Understanding SQL Subqueries
Writing External Applications to Query and Manipulate Database Data
Mastering Delphi 7
Modeling and OOP Programming (with ModelMaker)
Delphis Database Architecture
Delphi for .NET Preview: The Language and the RTL
Appendix A Extra Delphi Tools by the Author
Appendix C Free Companion Books on Delphi
Ruby Cookbook (Cookbooks (OReilly))
Testing Whether an Object Is String-Like
Running a Code Block Periodically
Implementing Enumerable: Write One Method, Get 22 Free
Using Object Relational Mapping with Og
Sending Mail with Rails
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the Authentication Process
Attacking Oracle PL/SQL Web Applications
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies