Flylib.com
International
↵
Doing Business with China
2003
1905050089
Electronic Commerce (Networking Serie 2003)
2004
1584500646
The Supply Chain Imperative. How to Ensure Ethical Behavior in Your Global Suppliers
2004
0814407838
Going Virtual(c) Distributed Communities of Practice
2006
1591402719
The Information Systems Security Officer's Guide. Establishing and Managing an Information Protection Program
2002
0750698969
Creating Regional Wealth in the Innovation Economy. Models, Perspectives, and Best Practices
2002
0130654159
Show 1-6/6
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Object Description in Cryptography Using ASN.1
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Developing Tablet PC Applications (Charles River Media Programming)
The Tablet PC
Introduction to Visual Basic .NET
Working with VB .NET
Obtaining the Tablet PC SDK
Custom Grammars for Speech Recognition
Java How to Program (6th Edition) (How to Program (Deitel))
Classes, Objects, Methods and Instance Variables
Introduction
Java Exception Hierarchy
String Permutations
Overloading Generic Methods
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
InDesign Type: Professional Typography with Adobe InDesign CS2
Dashes
Oldstyle Figures
Discretionary Hyphens and Nonbreaking Hyphens
Applying Styles
Shaping Text Frames
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Oracle and PL/SQL
Indirect Privilege Escalation
Defeating Virtual Private Databases
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies