Flylib.com
Careers
↵
Software Configuration Management
Configuration Control
Configuration Status Accounting
Configuration Management and Software Engineering Standards Reference
Appendix D Problem Change Report
Appendix Q Problem Trouble Report (PTR)
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Combos and Lists
Trees
Printing
Creating a Text Editor with JFace Text
Sample Application
Developing Tablet PC Applications (Charles River Media Programming)
Introduction to the VB .NET Language
Tablet PC Full Screen Utility
Using Gestures to Control Tablet Media Player
Getting Started with Microsoft Agent
Pong Game
Java Concurrency in Practice
Delegating Thread Safety
Task Cancellation
Avoiding and Diagnosing Deadlocks
Performance and Scalability
Amdahls Law
Comparing, Designing, and Deploying VPNs
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Deploying Site-to-Site IPsec VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
Review Questions
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Triggers
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies