Flylib.com
Part I: Introduction
Previous page
Table of content
Next page
Chapter 1. Security by Default
Chapter 2. Basics of Security
Previous page
Table of content
Next page
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204
Authors:
Christopher Steel
,
Ramesh Nagappan
,
Ray Lai
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Converting Numbers to Strings
Printing a Range to a Stream
Using Constructors and Destructors to Manage Resources (or RAII)
Implementing a Dynamically Sized Matrix
Multiplying Matricies
C++ GUI Programming with Qt 3
Basic Layouts
Advanced Clipboard Handling
Input/Output
Reading and Writing Binary Data
Interfacing with Native APIs
An Introduction to Design Patterns in C++ with Qt 4
Streams and Dates
Parameter Passing by Value
Derivation from an Abstract Base Class
QMetaObject: The MetaObject Pattern
Review Questions
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Computer Network Basics
Designing and Installing Distributed Video Systems
Water Management Systems
Troubleshooting and Maintaining a Home Security System
Home Access Control Systems
Java Concurrency in Practice
Threads are Everywhere
Visibility
Adding Functionality to Existing Thread-safe Classes
Summary of Part I
Configuring ThreadPoolExecutor
Understanding Digital Signal Processing (2nd Edition)
DISCRETE LINEAR SYSTEMS
INTERPRETING THE DFT
INTERPOLATED LOWPASS FIR FILTERS
QUADRATURE SIGNALS IN THE FREQUENCY DOMAIN
COMPUTING FFT TWIDDLE FACTORS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies