Table of content
What is authentication?
What are several methods for Web-based authentication?
What is encryption?
What is access security?
Why should applications provide auditing services?
Which Windows NT services provide mechanisms for auditing?
Table of content
Microsoft Corporation - Analyzing Requirements and Defining Solutions Architecture. MCSD Training Kit
BUY ON AMAZON
MySQL Stored Procedure Programming
Using SELECT Statements with an INTO Clause
Using MySQL Stored Programs with PHP
A Complete Example
Tuning DML (INSERT, UPDATE, DELETE)
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Developing a Kanban Design
Auditing the Kanban
Appendix A MRP vs. Kanban
Appendix I Case Study 2: Rubber Extrusion Plant
Appendix J Abbreviations and Acronyms
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Cisco IP Phone Codec Support
Configuring Cisco Gateways and Trunks
SIP and Cisco CallManager
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Analysis and Design
The Test Organization
Appendix A Glossary of Terms
Appendix B Testing Survey
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Form Presentation and Validation with Struts
Templates and Velocity
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
VBScript in a Nutshell, 2nd Edition
Active Server Pages Object Model
VBScript with Internet Explorer
Section A.7. Dictionary Object
Section C.2. String Operator
Section E.1. How Encoding and Decoding Works
flylib.com © 2008-2017.
If you may any questions please contact us: firstname.lastname@example.org
to find out more.