Flylib.com
Part IV: Designing Countermeasures for Tomorrow s Threats
Previous page
Table of content
Next page
Chapter List
Chapter 16: Exploiting Digital Forensics
Chapter 17: Viruses, Worms, Trojans, and Other Malicious Code
Chapter 18: Exploiting Software
Previous page
Table of content
Next page
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120
Authors:
Victor Oppleman
,
Oliver Friedrichs
,
Brett Watson
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Basic Commands, Variables, and Data Types
Looping Commands
Basic Graphics Commands
The Art of Using Animated Sprites for 2D Games
Adding Sound Effects to Your Game
Agile Project Management: Creating Innovative Products (2nd Edition)
Innovative Product Development
Principles to Practices
Phase: Speculate
Self-Organization Extensions
Reliable Innovation
Managing Enterprise Systems with the Windows Script Host
File Operations
Input/Output Streams
Regular Expressions
Internet Information Server
Exchange Server
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Notification and eventing
Contrasting service modeling approaches (an example)
Service-Oriented Design (Part II: SOA Composition Guidelines)
WS-ReliableMessaging language basics
Integration considerations
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Using CronTriggers in the JobInitializationPlugin
Using the FileScanListener
Creating the RMI Client
What Does Clustering Mean to Quartz?
Working with the Scheduler
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
XML
Multithreading
Printing and Drawing with GDI+
ASP.NET Web Applications
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies