Flylib.com
Appendix C. Technical Acronyms Used in This Book
Previous page
Table of content
Next page
< Day Day Up >
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
< Day Day Up >
Previous page
Table of content
Next page
Enterprise Javaв„ў Security: Building Secure J2EEв„ў Applications
ISBN: 0321118898
EAN: 2147483647
Year: 2004
Pages: 164
Authors:
Marco Pistoia
,
Nataraj Nagaratnam
,
Larry Koved
,
Anthony Nadalin
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Getting Started
ORM Constraints
Configuring, Manipulating, and Reusing ORM Models
Generating a Physical Database Schema
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 4 Motherboard/Processors/Memory
Domain 5 Printers
Domain 6 Basic Networking
Domain 4 Networks
WebLogic: The Definitive Guide
Virtual Hosting
Handling System Failure
An Overview of Clustering
Tuning the JVM
SSL
Snort Cookbook
Running Snort as a Windows Service
Logging Only Alerts
Logging in PCAP Format (TCPDump)
Detecting and Normalizing HTTP Traffic
Installing and Configuring Barnyard
What is Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
DNS & BIND Cookbook
Adding Similar Records
Configuring a Name Server to Work with rndc
Configuring DNS for Virtual Email Addresses
Viewing a Name Servers Cache
Defining a TSIG Key
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies