Flylib.com
Z
Previous page
Table of content
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
Zero Day problem
zombies 2nd
Zoned Equipment Program
Previous page
Table of content
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121
Authors:
Rick Lehtinen
,
G.T. Gangemi Sr.
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Distinguished Names and Certificates
Certificate Revocation and Path Validation
Image Processing with LabVIEW and IMAQ Vision
Some Definitions
Color Images
Camera Interfaces and Protocols
Image Standards
Application Examples
Managing Enterprise Systems with the Windows Script Host
Logon Scripts and Scheduling
Network Administration/WMI
Internet Applications
System Administration
Security
Mastering Delphi 7
Building the User Interface
Writing Delphi Components
Libraries and Packages
Modeling and OOP Programming (with ModelMaker)
Web Programming with IntraWeb
GO! with Microsoft Office 2003 Brief (2nd Edition)
Business Running Case
Performance Assessments
Using Functions and Data Tables
Objective 10. Close and Save a Database
Skill Assessments
Web Systems Design and Online Consumer Behavior
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XV Customer Trust in Online Commerce
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies