Flylib.com
Internet
↵
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Managing IT Functions
Governing Information Technology Through COBIT
The Evolution of IT Governance at NB Power
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
show Commands
Mapping Hostnames to IP Addresses
Enabling SNMP
show line
Reverse Telnet
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Basics
Transmission Control Protocol (TCP) Basics
Transmission Control Protocol (TCP) Data Flow
Domain Name System (DNS)
Virtual Private Networks (VPNs)
Ruby Cookbook (Cookbooks (OReilly))
Multiplying Matrices
Blocks as Closures: Using Outside Variables Within a Code Block
Strongly Encrypting Data
Serializing Data with YAML
Automatically Running Unit Tests
Java Concurrency in Practice
Safe Publication
Why are GUIs Single-threaded?
Avoiding Liveness Hazards
Explicit Locks
Atomic Variables and Nonblocking Synchronization
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies