![]() | Warwick Ford, Michael S. Baum Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition) y. Publisher: ISBN: 0130272760 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Dimitris Gritzalis Secure Electronic Voting (Advances in Information Security) y. Publisher: ISBN: 1402073011 Book size: ; Page extent: 0. | PUT TO THE BASKET |
![]() | Patrick McBride, Jody Patilla, Craig Robinson, Peter Thermos, Edward P. Moser Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age y. Publisher: ISBN: 0849312396 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Rolf Oppliger Secure Messaging with PGP and S/MIME y. Publisher: ISBN: 158053161X Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Jalal Feghhi, Jalil Feghhi Secure Networking with Windows 2000 and Trust Services y. Publisher: ISBN: 0201657783 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Mohammed J. Kabir, Mohammed J. Kabir Secure PHP Development: Building 50 Practical Applications y. Publisher: ISBN: 0764549669 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | John Viega, Matt Messier Secure Programming Cookbook for C and C++ y. Publisher: ISBN: 0596003943 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Brian Chess, Jacob West Secure Programming with Static Analysis (Addison-Wesley Software Security Series) 2007 y. Publisher: ISBN: 0321424778 Book size: ; Page extent: 624. | PUT TO THE BASKET |
![]() | Qingfeng Chen, Chengqi Zhang, Shichao Zhang Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science) 2008 y. Publisher: ISBN: 3540850732 Book size: ; Page extent: 234. | PUT TO THE BASKET |
![]() | Martin Stone, Spencer Strauss Secure Your Financial Future Investing in Real Estate y. Publisher: ISBN: 0793161290 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | James Winter Secure from Rash Assault: Sustaining the Victorian Environment y. Publisher: ISBN: 0520229304 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Carl F. Endorf Secured Computing: A SSCP Study Guide y. Publisher: ISBN: 1553691881 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | IBM Redbooks Secured Single Signon in a Client/Server Environment y. Publisher: ISBN: 0738406090 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Henry J. Bailey, Richard B. Hagedorn Secured Transactions in a Nutshell Nutshell Series) (4th ed) y. Publisher: ISBN: 0314238174 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Christopher Wells Securing Ajax Applications: Ensuring the Safety of the Dynamic Web 2007 y. Publisher: ISBN: 0596529317 Book size: ; Page extent: 400. | PUT TO THE BASKET |
![]() | Peter R., MBA Ramsaroop Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World 2004 y. Publisher: ISBN: 0972824715 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Jonathan S. Held, John R. Bowers Securing E-Business Applications and Communications y. Publisher: ISBN: 0849309638 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Timothy Braithwaite Securing E-Business Systems: A Guide for Managers and Executives y. Publisher: ISBN: 0471072982 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | David M. De Ferranti, Guillermo Perry Securing Our Future in a Global Economy y. Publisher: ISBN: 0821347306 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Dan Kroll Securing Our Water Supply: Protecting a Vulnerable Resource 2006 y. Publisher: ISBN: 1593700695 Book size: ; Page extent: 200. | PUT TO THE BASKET |
![]() | Michael Sheehan Securing Outer Space: International Relations Theory and the Politics of Space (Routledge Critical Security Studies) 2009 y. Publisher: ISBN: 0415460565 Book size: ; Page extent: 272. | PUT TO THE BASKET |
![]() | Paul Osterman Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It y. Publisher: ISBN: 0691086885 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Ronald L. Krutz Securing SCADA Systems 2005 y. Publisher: ISBN: 0764597876 Book size: ; Page extent: 218. | PUT TO THE BASKET |
![]() | Gavin Cawthra Securing South Africa`s Democracy: Defense, Development and Security in Transition (International Political Economy Series) y. Publisher: ISBN: 0312174195 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Peter Thermos, Ari Takanen Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures 2007 y. Publisher: Addison-Wesley Professional ISBN: 0321437349 Book size: ; Page extent: 384. | PUT TO THE BASKET |
![]() | Stefan Norberg Securing Windows NT/2000 Servers for the Internet y. Publisher: ISBN: 1565927680 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Michael A. Simonyi Securing Windows NT/2000: From Policies to Firewalls y. Publisher: ISBN: 0849312612 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Betty Meredith Securing Your Financial Future y. Publisher: ISBN: 0970222017 Book size: ; Page extent: . | PUT TO THE BASKET |
![]() | Mark Lee Securing Your PC in Easy Steps (In Easy Steps) 2007 y. Publisher: ISBN: 1840783362 Book size: ; Page extent: 192. | PUT TO THE BASKET |
![]() | Bill Griffith Jr. CFP Securing a Retirement Income for Life 2006 y. Publisher: ISBN: 0978550609 Book size: ; Page extent: 212. | PUT TO THE BASKET |
![]() | Peter T. Davis Securing and Controlling Cisco Routers y. Publisher: ISBN: 0849312906 Book size: ; Page extent: . | PUT TO THE BASKET |