by
Jewkes, Yvonne, 1966-
Format:
Books
Publication Date
2010
Excerpt:
Handbook of Internet crime / Jewkes, Yvonne, 1966-
by
Williams, Brian K., 1938-
Format:
Books
Publication Date
2010
Excerpt:
: exploring cyberspace -- Software: tools for productivity & creativity -- Hardware: the CPU & storage
by
Grove, Ralph F.
Format:
Books
Publication Date
2010
Excerpt:
Application software -- Development.
by
Young, Antony, 1964-
Format:
Books
Publication Date
2010
Excerpt:
Internet marketing.
by
Parsons, June Jamrich.
Format:
Books
Publication Date
2010
Excerpt:
software -- Operating systems and file management -- LANs and WLANs -- The internet -- The web and e
by
Schneider, Gary P., 1952-
Format:
Books
Publication Date
2009
Excerpt:
-- Electronic commerce software -- Electronic commerce security -- Payment systems for electronic commerce
by
Brandon, Dan, 1946-
Format:
Books
Publication Date
2008
Excerpt:
Software engineering for modern Web applications : methodologies and technologies / Brandon, Dan
by
Gaïti, Dominique.
Table of contents only http://www.loc.gov/catdir/toc/ecip0717/2007018294.html
Contributor biographical information http://www.loc.gov/catdir/enhancements/fy0806/2007018294-b.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0806/2007018294-d.html
Contributor biographical information http://www.loc.gov/catdir/enhancements/fy0806/2007018294-b.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0806/2007018294-d.html
Format:
Books
Publication Date
2008
Excerpt:
, Abdallah M'Hamed and Djamal Zeghlache -- Ch. 3. Software Agents for IP Management / Anneli Lenica -- Ch. 4
by
Brown, Charles E.
Format:
Books
Publication Date
2008
Excerpt:
Application software -- Development.
10.
by
Jacobs, Sas.
Format:
Books
Publication Date
2008
Excerpt:
Internet software.
by
Gallaher, Michael P.
Format:
Books
Publication Date
2008
Excerpt:
Recommendations -- 8. Data Encryption Standards -- 9. Improving Internet Standards -- 10. Infrastructure for
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
. Communications and operations management -- 13. Controls against malicious software (malware) and back-ups -- 14
Limit Search Results
Narrowed by: