[MSDN Library June 1998] Identifying Users (37.4618902439024%)
MSDN Library Visual Studio 6.0 > Books > Microsoft Jet Database Engine Programmer's Guide > Chapter 6 Creating Multiuser Applications > Other Issues in Multiuser Design
[MSDN Library April 2000] Identifying Users (37.4618902439024%)
MSDN Library - April 2000 > Books > Microsoft Jet Database Engine Programmer's Guide > Chapter 6 Creating Multiuser Applications > Other Issues in Multiuser Design
[MSDN Library June 1998] Identifying the Data (35.5725964537111%)
MSDN Library Visual Studio 6.0 > Visual Studio Documentation > Using Visual Studio > Developing for the Enterprise > Part 2: Data Access and Security Strategies > Chapter 4: Designing Enterprise Data
[MSDN Library April 2000] Identifying the Data (35.5725964537111%)
MSDN Library - April 2000 > Visual Studio 6.0 Documentation > Visual Studio Documentation > Using Visual Studio > Developing for the Enterprise > Part 2: Data Access and Security Strategies > Chapter 4: Designing Enterprise Data
[MSDN Library April 2000] Identifying Main User Tables (34.836032388664%)
MSDN Library - April 2000 > Office Developer Documentation > Office 2000 Documentation > Microsoft Access Workflow Designer for Microsoft SQL Server > Access Workflow Designer Developer's Guide > Developing a Team Solution > Setting up a Table Hierarchy > Defining Hierarchy Schema
[MSDN Library April 2000] Identifying Users In IIS (33.6539392179636%)
MSDN Library - April 2000 > Partial Books > Professional MTS and MSMQ With VB and ASP > Chapter 7 - Securing Your DNA Applications > Securing Internet Information Server
[MSDN Library April 2000] Identifying Nodes (33.2508304921759%)
MSDN Library - April 2000 > Platform SDK > Base Services > Windows Clustering > Network Load Balancing Provider > Using the Network Load Balancing Provider > Calling Methods
[MSDN Library June 1998] Identifying the User Behind the Action (31.9784126841403%)
MSDN Library Visual Studio 6.0 > Windows Resource Kits > Windows NT Workstation 4.0 Resource Kit > Appendix B - Security In a Software Development Environment > Interpreting the Security Log
[MSDN Library June 1998] Identifying Whether It Works in Other Situations (31.317007797271%)
MSDN Library Visual Studio 6.0 > Windows Resource Kits > Windows NT Server 4.0 Resource Kit > Windows NT Server Resource Guide > Chapter 8 - General Troubleshooting > Troubleshooting Methodology
[MSDN Library June 1998] Identifying Business Objects (30.8924485125858%)
MSDN Library Visual Studio 6.0 > Partial Books > Professional Visual Basic 5.0 Business Objects > Chapter 3: Business Object Analysis > Functional Use Case