by
Hoog, Andrew.
Format:
Books
Publication Date
2011
Excerpt:
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
by
Hoog, Andrew.
Format:
Books
Publication Date
2011
Excerpt:
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
by
Gibson, Darril.
Format:
Books
Publication Date
2011
Excerpt:
Computer security.
by
Xiao, Yang, 1966-
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Table of contents http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA
Table of contents http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA
Format:
Books
Publication Date
2011
Excerpt:
Computer networks -- Security measures.
by
Serpanos, Dimitrios Nikolaou.
Format:
Books
Publication Date
2011
Excerpt:
Computer network architectures.
by
Baldauf, Ken.
Format:
Books
Publication Date
2011
Excerpt:
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
by
Chappell, Laura.
Format:
Books
Publication Date
2010
Excerpt:
Computer networks -- Security measures.
by
Davis, Chris.
Format:
Books
Publication Date
2010
Excerpt:
Computer security.
by
Merkow, Mark S.
Format:
Books
Publication Date
2010
Excerpt:
Computer security.
by
Moeller, Robert R.
Format:
Books
Publication Date
2010
Excerpt:
Computer networks -- Security measures.
by
Timm, Carl.
Format:
Books
Publication Date
2010
Excerpt:
Computer networks -- Security measures.
by
Shema, Mike.
Format:
Books
Publication Date
2010
Excerpt:
Computer networks -- Security measures.
Limit Search Results
Narrowed by:

