by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
Thomson Course Technology,
by
Adomi, Esharenana E.
Format:
Books
Publication Date
2008
Excerpt:
security measures and software necessary for cybercafes, offering information technology professionals
by
Yee, George.
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032104.html
Format:
Books
Publication Date
2006
Excerpt:
, Challenges, Models, and Dimensions -- Privacy Protection Through Security -- Pseudonym Technology for E
by
Fadia, Ankit, 1985-
Format:
Books
Publication Date
2006
Excerpt:
Thomson Course Technology,
by
Egan, Mark.
Format:
Books
Publication Date
2005
Excerpt:
Information technology -- Management.
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
presents the best concepts that high technology, classical security practice, and common sense have to
Limit Search Results
Narrowed by: