Flylib.com
Earth Sciences
↵
Inside Network Security Assessment: Guarding Your IT Infrastructure
Introduction to Assessing Network Vulnerabilities
Risk-Assessment Methodologies
Defining the Scope of the Assessment
Critical Systems and Information Forms
Appendix E. SIRT Team Report Format Template
Metrics and Models in Software Quality Engineering (2nd Edition)
Quality: Professional Views
Basic Assumptions
Model Assumptions
How Do You Know Your Product Is Good Enough to Ship?
Statistical Process Control in Software Development
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Introduction
Mapping strings to Other Things
Classes
Multiplying Matricies
Writing and Reading Currency
Managing Enterprise Systems with the Windows Script Host
Introduction
Registry Operations
Network Administration/WMI
Data Access
Security
101 Microsoft Visual Basic .NET Applications
Data Access
Working with the .NET Framework
GDI+
Building Enterprise Services Applications
Visual Studio .NET
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies