Flylib.com
Games & Strategy Guides
↵
Software Configuration Management
Configuration Change Management
Appendix I System Service Request
Appendix M Problem Report (PR)
Appendix N Corrective Action Processing (CAP)
Appendix V Functional Configuration Audit (FCA) Checklist
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Comparing Floating-Point Numbers with Bounded Accuracy
Trimming a String
Storing Containers in Containers
Comparing Ranges
Transforming an XML Document with XSLT
The Complete Cisco VPN Configuration Guide
IPsec Standards
Troubleshooting VPN Connections
Router Product Overview
Routers as Certificate Authorities
Troubleshooting PIX and ASA Connections
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Restructuring
Cultural change
IT-based process change
Twisted Network Programming Essentials
Building Simple Clients and Servers
Working with Asynchronous Results
Mail Servers
Providing POP3 Access to Mailboxes
Running a Twisted Application as a Daemon
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Forms
Design-Time Support for Custom Controls
Dynamic User Interface
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies