by
SUTTON, DAVID.
Format:
Books
Publication Date
2022
Excerpt:
CYBER SECURITY : the complete guide to cyber threats and protection. SUTTON, DAVID.
by
Black, P. A. (Philip A.)
Format:
Books
Publication Date
2019
Excerpt:
Africa -- Social security -- Cost-benefit analysis -- Introduction to taxation and tax equity -- Tax
by
Black, P. A. (Philip A.)
Format:
Books
Publication Date
2015
Excerpt:
Africa -- Social security -- Cost-benefit analysis -- Introduction to taxation and tax equity -- Tax
by
Ciampa, Mark D., author.
Format:
Books
Publication Date
2015
Excerpt:
Computing Technology Industry Association security+ guide to network security fundamentals
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
Security in computing / Pfleeger, Charles P., 1948- author.
by
McGregor, Marie.
Format:
Books
Publication Date
2014
Excerpt:
(LRA) --7. Social security legislation --pt. III: Rules applicable to the termination of the employment
by
Ciampa, Mark D.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Format:
Books
Publication Date
2012
Excerpt:
Security+ guide to network security fundamentals / Ciampa, Mark D.
by
Meyers, Mike, 1961-
Format:
Books
Publication Date
2012
Excerpt:
-mail -- Synchronization -- Security -- Preventing damage -- Dealing with loss -- Recovering from theft -- Chapter review
by
McGregor, Marié.
Format:
Books
Publication Date
2012
Excerpt:
) -- Protection against unfair labour practices under the Labour Relations Act (LRA) -- Social security
by
Deitel, Harvey M., 1945-
Format:
Books
Publication Date
2001
Excerpt:
Infrastructure, Certificates and Certification Authorities Cryptanalysis Security Protocols Security Attacks
by
Mallor, Jane P.
Format:
Books
Publication Date
1998
Excerpt:
-- Business and the Constitution -- Business ethics, corporate social responsibility, and the control and
Limit Search Results
Narrowed by: