Flylib.com
Architecture
↵
Interprocess Communications in Linux: The Nooks and Crannies
Unnamed Pipes
Semaphore Control
Peeking at Data
Summary
Debugging Multithreaded Programs
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Key and Certificate Management Using Keystores
Appendix C Using the Bouncy Castle API for Elliptic Curve
The CISSP and CAP Prep Guide: Platinum Edition
Application Security
Business Continuity Planning and Disaster Recovery Planning
Legal, Regulations, Compliance, and Investigations
Initiation of the System Authorization Process
Appendix E The Information System Security Management Professional (ISSMP) Certification
C++ How to Program (5th Edition)
Terminology
Wrap-Up
Rethrowing an Exception
Special Section: Building Your Own Compiler
Exercises
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Leading change
Restructuring
Cultural change
101 Microsoft Visual Basic .NET Applications
Working with the Microsoft Visual Basic .NET Language
Interacting with the Operating System
COM Interop/PInvoke
Visual Studio .NET
Windows Server 2003 for .NET Developers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies