Flylib.com
Administrative Law
↵
CISSP Exam Cram 2
BUSINESS CONTINUITY PLANNING
The Risk of Poor Security Management
Computer System Architecture
The System Development Life Cycle
Forensics
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Resource Risk
Managing Project Risk
Monitoring and Controlling Risky Projects
Closing Projects
Appendix A Selected Detail From the PERIL Database
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Client 4An Interactive Query Processor
Client 2Adding Error Checking
Prerequisites
PL/JavaWriting Stored Procedures in Java
Arranging for PostgreSQL Startup and Shutdown
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and Computers
Captology Looking Forward
Microsoft WSH and VBScript Programming for the Absolute Beginner
Constants, Variables, and Arrays
Conditional Logic
Processing Collections of Data
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies