Flylib.com
Index_T
Previous page
Table of content
Next page
T
theft 2
threat matrix 97
Trojan horses 9
trusted partners 3
trusted systems 87
Previous page
Table of content
Next page
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Security Requires Information Classification
Laws, Mandates, and Regulations
Best Practices for Quantitative and Qualitative Risk Assessment
Recommendations
Conclusions
Software Configuration Management
The DoD CM Process Model
Configuration Status Accounting
Appendix C Sample Data Dictionary
Appendix G Sample Inspection Plan
Appendix Y Supplier CM Market Analysis Questionnaire
SQL Tips & Techniques (Miscellaneous)
Using Data Control Language (DCL) to Setup Database Security
Working with Comparison Predicates and Grouped Queries
Understanding SQL Subqueries
Writing Advanced Queries and Subqueries
Exploiting MS-SQL Server Built-in Stored Procedures
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Training
Initial Startup and Common Pitfalls
Appendix A MRP vs. Kanban
Appendix D Organizational Changes Required for Kanban
Appendix F Implementation in Large Plants
Mastering Delphi 7
The Delphi Programming Language
Writing Delphi Components
Client/Server with dbExpress
Working with ADO
Web Services and SOAP
Special Edition Using Crystal Reports 10
Introduction
What Is Crystal Enterprise?
Troubleshooting
Ensuring a Successful Crystal Enterprise Implementation
Understanding the Report Designer Component
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies