by
Morley, Deborah.
Format:
Books
Publication Date
2013
Excerpt:
-- Input and output -- System software: Operating systems and utility programs -- Application software
by
Bergman, Neil.
Format:
Books
Publication Date
2013
Excerpt:
Mobile communication systems -- Security measures.
by
Guo, Rongxing.
Format:
Books
Publication Date
2013 2012
Excerpt:
social security -- Income Distribution and Social Justice -- Spatial Economics and Development Strategy
by
Peeters, Eric, author.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Format:
Books
Publication Date
2013
Excerpt:
Embedded computer systems -- Security measures.
by
Kwok, Yu-Kwong Ricky.
Format:
Books
Publication Date
2012
Excerpt:
concepts covered.Addressing the unique challenges of P2P systems, this book presents practical applications
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
A multidisciplinary introduction to information security / Mjølsnes, Stig F.
by
Lalwani, Chandra.
Format:
Books
Publication Date
2012
Excerpt:
-- Planning Transport Infrastructure -- Transport Security -- Logistics Service Providers -- Procurement
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
Principles of information security / Whitman, Michael E., 1964-
57.
by
Schneider, Gary P., 1952-
Format:
Books
Publication Date
2012
Excerpt:
Security -- Online Payment Systems -- Implementing E-Business Initiatives.
by
Edelbacher, Max.
Format:
Books
Publication Date
2012
Excerpt:
Financial crimes : a threat to global security / Edelbacher, Max.
by
Spellman, Frank R.
Format:
Books
Publication Date
2012
Excerpt:
Vulnerabilities -- Cyber Threats to Control Systems -- Securing Control Systems -- Steps to Improve SCADA Security
by
Hoyt, Robert E., 1945-
Format:
Books
Publication Date
2012
Excerpt:
record examples ; Future trends -- 4. Practice management sytems : Clinical and administrative workflow
Limit Search Results
Narrowed by: