Flylib.com
Part III: Securing Your System
Previous page
Table of content
Next page
Chapter List
Chapter 14: Windows Security
Chapter 15: Internet Security
Chapter 16: Protecting Your Privacy
Previous page
Table of content
Next page
Hacking Windows Vista: ExtremeTech
ISBN: 0470046872
EAN: 2147483647
Year: 2007
Pages: 105
Authors:
Steve Sinchak
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Getting Started
Configuring, Manipulating, and Reusing ORM Models
Mapping ORM Models to Logical Database Models
Reverse Engineering and Importing to ORM
Reverse Engineering Physical Schemas to Logical Models
Java I/O
Subclassing OutputStream
Object Serialization
Compaction
Choosing a Locale
Controlling Devices
Metrics and Models in Software Quality Engineering (2nd Edition)
Some Basic Measures
Measurement Errors
Reliability, Availability, and Defect Rate
Measuring Process Capability
Getting Started with a Software Metrics Program
Oracle Developer Forms Techniques
Standard Toolbar Implementation
Form Management in an OPEN_FORM Configuration
Taking Advantage of PL/SQL 2.x in Forms
Object and Code Reusability
Summary
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Cursors
PL/pgSQL and Security
JDBC Architecture Overview
Client 1Connecting to the Server
Client 2An Interactive Query Processor
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Voice of the Customer (VOC)
Descriptive Statistics and Data Displays
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies