by
Xiao, Yang, 1966-
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=018713193&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Table of contents http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA
Table of contents http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=018713193etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA
Format:
Books
Publication Date
2011
Excerpt:
Computer networks -- Security measures.
by
Stallings, William.
Format:
Books
Publication Date
2011
Excerpt:
Computer networks -- Security measures.
by
Moore, Robert, 1976-
Format:
Books
Publication Date
2011
Excerpt:
Computer security -- Law and legislation -- United States.
by
Hoog, Andrew.
Format:
Books
Publication Date
2011
Excerpt:
Android forensics : investigation, analysis, and mobile security for Google Android / Hoog, Andrew.
by
Gibson, Darril.
Format:
Books
Publication Date
2011
Excerpt:
Computer security.
by
Baldauf, Ken.
Format:
Books
Publication Date
2011
Excerpt:
Succeeding with technology : computer system concepts for your life / Baldauf, Ken.
by
Howard, Doug.
Format:
Books
Publication Date
2011
Excerpt:
Security 2020 : reduce security risks this decade / Howard, Doug.
by
Davis, Chris.
Format:
Books
Publication Date
2010
Excerpt:
Computer security.
by
Moeller, Robert R.
Format:
Books
Publication Date
2010
Excerpt:
Computer networks -- Security measures.
by
Timm, Carl.
Format:
Books
Publication Date
2010
Excerpt:
Computer networks -- Security measures.
by
Chappell, Laura.
Format:
Books
Publication Date
2010
Excerpt:
Computer networks -- Security measures.
by
Wells, Joseph T.
Publisher description http://www.loc.gov/catdir/enhancements/fy1007/2010013506-d.html
Table of contents only http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html
Table of contents only http://www.loc.gov/catdir/enhancements/fy1007/2010013506-t.html
Format:
Books
Publication Date
2010
Excerpt:
Computer security -- Case studies.
Limit Search Results