Flylib.com
International
↵
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Converting a String to a Numeric Type
Storing Objects in a list
Making a Class Writable to a Stream
Introduction
Transforming an XML Document with XSLT
C++ How to Program (5th Edition)
Special Section: Building Your Own Computer
Proxy Classes
Self-Review Exercises
Exercises
M.3. The print and set Commands
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Organizational change
Leading change
Mergers and acquisitions
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Architecture
Internet Security Systems RealSecure
Data Correlation
Incident Response
Policy and Procedures
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Technology Fundamentals
Types of Network Connections
LAN Characteristics
Whats Next on the Internet
Multimedia Networking Requirements
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Time Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies