Warwick Ford, Michael S. Baum Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition) y. Publisher: ISBN: 0130272760 Book size: ; Page extent: . | PUT TO THE BASKET |
Dimitris Gritzalis Secure Electronic Voting (Advances in Information Security) y. Publisher: ISBN: 1402073011 Book size: ; Page extent: 0. | PUT TO THE BASKET |
Patrick McBride, Jody Patilla, Craig Robinson, Peter Thermos, Edward P. Moser Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age y. Publisher: ISBN: 0849312396 Book size: ; Page extent: . | PUT TO THE BASKET |
Rolf Oppliger Secure Messaging with PGP and S/MIME y. Publisher: ISBN: 158053161X Book size: ; Page extent: . | PUT TO THE BASKET |
Jalal Feghhi, Jalil Feghhi Secure Networking with Windows 2000 and Trust Services y. Publisher: ISBN: 0201657783 Book size: ; Page extent: . | PUT TO THE BASKET |
Mohammed J. Kabir, Mohammed J. Kabir Secure PHP Development: Building 50 Practical Applications y. Publisher: ISBN: 0764549669 Book size: ; Page extent: . | PUT TO THE BASKET |
John Viega, Matt Messier Secure Programming Cookbook for C and C++ y. Publisher: ISBN: 0596003943 Book size: ; Page extent: . | PUT TO THE BASKET |
Brian Chess, Jacob West Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2007 y. Publisher: ISBN: 0321424778 Book size: ; Page extent: 624. | PUT TO THE BASKET |
Qingfeng Chen, Chengqi Zhang, Shichao Zhang Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science) 2008 y. Publisher: ISBN: 3540850732 Book size: ; Page extent: 234. | PUT TO THE BASKET |
Martin Stone, Spencer Strauss Secure Your Financial Future Investing in Real Estate y. Publisher: ISBN: 0793161290 Book size: ; Page extent: . | PUT TO THE BASKET |
James Winter Secure from Rash Assault: Sustaining the Victorian Environment y. Publisher: ISBN: 0520229304 Book size: ; Page extent: . | PUT TO THE BASKET |
Carl F. Endorf Secured Computing: A SSCP Study Guide y. Publisher: ISBN: 1553691881 Book size: ; Page extent: . | PUT TO THE BASKET |
IBM Redbooks Secured Single Signon in a Client/Server Environment y. Publisher: ISBN: 0738406090 Book size: ; Page extent: . | PUT TO THE BASKET |
Henry J. Bailey, Richard B. Hagedorn Secured Transactions in a Nutshell Nutshell Series) (4th ed) y. Publisher: ISBN: 0314238174 Book size: ; Page extent: . | PUT TO THE BASKET |
Christopher Wells Securing Ajax Applications: Ensuring the Safety of the Dynamic Web 2007 y. Publisher: ISBN: 0596529317 Book size: ; Page extent: 400. | PUT TO THE BASKET |
Peter R., MBA Ramsaroop Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World 2004 y. Publisher: ISBN: 0972824715 Book size: ; Page extent: . | PUT TO THE BASKET |
Jonathan S. Held, John R. Bowers Securing E-Business Applications and Communications y. Publisher: ISBN: 0849309638 Book size: ; Page extent: . | PUT TO THE BASKET |
Timothy Braithwaite Securing E-Business Systems: A Guide for Managers and Executives y. Publisher: ISBN: 0471072982 Book size: ; Page extent: . | PUT TO THE BASKET |
David M. De Ferranti, Guillermo Perry Securing Our Future in a Global Economy y. Publisher: ISBN: 0821347306 Book size: ; Page extent: . | PUT TO THE BASKET |
Dan Kroll Securing Our Water Supply: Protecting a Vulnerable Resource 2006 y. Publisher: ISBN: 1593700695 Book size: ; Page extent: 200. | PUT TO THE BASKET |
Michael Sheehan Securing Outer Space: International Relations Theory and the Politics of Space (Routledge Critical Security Studies) 2009 y. Publisher: ISBN: 0415460565 Book size: ; Page extent: 272. | PUT TO THE BASKET |
Paul Osterman Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It y. Publisher: ISBN: 0691086885 Book size: ; Page extent: . | PUT TO THE BASKET |
Ronald L. Krutz Securing SCADA Systems 2005 y. Publisher: ISBN: 0764597876 Book size: ; Page extent: 218. | PUT TO THE BASKET |
Gavin Cawthra Securing South Africa`s Democracy: Defense, Development and Security in Transition (International Political Economy Series) y. Publisher: ISBN: 0312174195 Book size: ; Page extent: . | PUT TO THE BASKET |
Peter Thermos, Ari Takanen Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures 2007 y. Publisher: Addison-Wesley Professional ISBN: 0321437349 Book size: ; Page extent: 384. | PUT TO THE BASKET |
Stefan Norberg Securing Windows NT/2000 Servers for the Internet y. Publisher: ISBN: 1565927680 Book size: ; Page extent: . | PUT TO THE BASKET |
Michael A. Simonyi Securing Windows NT/2000: From Policies to Firewalls y. Publisher: ISBN: 0849312612 Book size: ; Page extent: . | PUT TO THE BASKET |
Betty Meredith Securing Your Financial Future y. Publisher: ISBN: 0970222017 Book size: ; Page extent: . | PUT TO THE BASKET |
Mark Lee Securing Your PC in Easy Steps (In Easy Steps) 2007 y. Publisher: ISBN: 1840783362 Book size: ; Page extent: 192. | PUT TO THE BASKET |
Bill Griffith Jr. CFP Securing a Retirement Income for Life 2006 y. Publisher: ISBN: 0978550609 Book size: ; Page extent: 212. | PUT TO THE BASKET |
Peter T. Davis Securing and Controlling Cisco Routers y. Publisher: ISBN: 0849312906 Book size: ; Page extent: . | PUT TO THE BASKET |