Flylib.com
Smells Covered
Previous page
Table of content
Next page
Feature Envy
Inappropriate Intimacy (General Form)
Message Chains
Middle Man
Previous page
Table of content
Next page
Refactoring Workbook
ISBN: 0321109295
EAN: 2147483647
Year: 2003
Pages: 146
Authors:
William C. Wake
BUY ON AMAZON
CISSP Exam Cram 2
OPERATIONS SECURITY
Self-Assessment
Exam Prep Questions
Telecommunications and Network Security
Symmetric Encryption
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
The Goals and Objectives of a Risk Assessment
Preparing the Final Report
Preparing for Analysis
Determining the Next Step
Image Processing with LabVIEW and IMAQ Vision
NI Vision Builder for Automated Inspection
Image Standards
Spatial Image Filtering
Image Analysis
Image Focus Quality
FileMaker Pro 8: The Missing Manual
Understanding Calculations
Your First Script
Putting a Complex Script Together
Import Data Sources
A.1. Getting Help from FileMaker Itself
MySQL Clustering
Installing MySQL-Max
Testing Your Cluster
Restoring a Backup
Web Farm/MySQL Farm
B Management Commands
Comparing, Designing, and Deploying VPNs
Deploying Site-to-Site and Remote Access VPNs: A Comparison
L2TPv3 Pseudowire Operation
Supporting Multicast Transport in MPLS Layer 3 VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Benefits and Drawbacks of L2TP Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies