Flylib.com
SYMBOL
Previous page
Table of content
Next page
Prev
don't be afraid of buying books
Next
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]
_Ref14773721
_Ref15118165
_Ref15118190
_Ref15122167
_Ref15122186
_Ref15713918
_Ref15713933
_Ref16046158
_Ref16046163
_Ref16395676
_Ref16406280
_Ref1732782
_Ref1732860
_Ref1732870
_Ref17791792
_Ref17791830
_Ref1810215
_Ref1810228
_Ref19434616
_Ref19434634
_Ref19437276
_Ref19437297
_Ref19438043
_Ref2060572
_Ref2060589
_Ref21157908
_Ref21157912
_Ref21158577
_Ref21158580
_Ref4669405
_Ref4669430
_Ref5444537
_Ref6589782
_Ref6589797
_Ref6589837
_Ref6589851
_Ref9741540
_Ref9741558
_Ref9842203
_Ref9842238
_Ref9842270
_Ref9842294
Amazon
Previous page
Table of content
Next page
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Managing Activity Risks
Closing Projects
Conclusion
Appendix A Selected Detail From the PERIL Database
VBScript Programmers Reference
Control of Flow
Appendix B Variable Naming Convention
Appendix D Visual Basic Constants Supported in VBScript
Appendix E VBScript Error Codes and the Err Object
Appendix G The Windows Script Host Object Model
Documenting Software Architectures: Views and Beyond
Part I. Software Architecture Viewtypes and Styles
Relation to Other Viewtypes
Examples of Interface Documentation
Why to Document Behavior
How to Document Behavior: Notations and Languages
SQL Hacks
Hack 31. Disaggregate a COUNT
Hack 36. Calculate the Distance Between GPS Locations
Hack 73. Mix File and Database Storage
Hack 76. Compress to Avoid LOBs
Hack 83. Find the Top n in Each Group
Managing Enterprise Systems with the Windows Script Host
Networking Resources
File Operations
Registry Operations
Internet Information Server
Exchange Server
802.11 Wireless Networks: The Definitive Guide, Second Edition
MAC Access Modes and Timing
Authentication
Evaluating a Logical Architecture
Selecting Security Protocols
Network Analyzers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies