Flylib.com
Women & Business
↵
CISSP Exam Cram 2
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
Self-Assessment
Assessing Exam Readiness
System Architecture and Models
Forensics
Inside Network Security Assessment: Guarding Your IT Infrastructure
Common Risk-Assessment Methodologies and Templates
Performing the Assessment
Level II Assessments
Tools Used for Assessments and Evaluations
Information Request Form
WebLogic: The Definitive Guide
Packaging and Deployment
Monitoring Clusters
MBean Notifications
Timer MBeans
Traps
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
The roots of SOA (comparing SOA to past architectures)
Service activity
Service-orientation and contemporary SOA
Service layer abstraction
Considerations for choosing SOA extensions
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 10. Georeference Digital Photos
Hack 11. How Far? How Fast? Geo-Enabling Your Spreadsheet
Hack 33. Georeference an Arbitrary Tourist Map
Hack 79. Geocode a U.S. Street Address
Hack 95. Model Interactive Spaces
Twisted Network Programming Essentials
Finding Answers to Your Questions
Using the REST Architecture for Web Services
Enabling Web Services Using XML-RPC
Using Authentication in a Twisted Server
Using Public Keys for Authentication
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies