Showing 201 - 220 results of 233 for search '"Security"', query time: 0.02s Refine Results
  1. 201
    by Behrouz A. Forouzan
    Published
    Subjects: ...Synopsis: Cryptography and Network Security 1 Introduction Part 1 Symmetric-Key Encipherment 2...
    TEXT
  2. 202
    by Gary McGraw
    Published
    Subjects: ...Software Security is about putting the touchpoints to work for you. Because you can apply...
    TEXT
  3. 203
    by - Wasito S.
    Published
    Subjects: ..., this offical study guide covers topics such as server roles and security, infrastructure planning and design...
    TEXT
  4. 204
    by Dave Taylor
    Published
    Subjects: ... privacy and security issues, and much more. Youll al...
    TEXT
  5. 205
    by Susan M. Cooney
    Published
    Subjects: ... privacy and security issues, and much more. Youll al...
    TEXT
  6. 206
    by Timothy R. Mayes
    Published
    Subjects: ..., budgets, the Market Security Line, pro forma state...
    TEXT
  7. 207
    by Todd M. Shank
    Published
    Subjects: ..., budgets, the Market Security Line, pro forma state...
    TEXT
  8. 208
    by Raj Kumar Shrivastav
    Published
    Subjects: ... of data security. 7. Information Technology app...
    TEXT
  9. 209
    by Brijnath Singh
    Published
    Subjects: ... of data security. 7. Information Technology app...
    TEXT
  10. 210
    by Merritt Maxim
    Published
    Subjects: ... Windows CE, Palm OS, UNIX, and Windows. Youll learn how to design and implement a solid security system...
    TEXT
  11. 211
    by David Pillino
    Published
    Subjects: ... Windows CE, Palm OS, UNIX, and Windows. Youll learn how to design and implement a solid security system...
    TEXT
  12. 212
    by Alan Calder
    Published
    Subjects: ... practice information security is essential. Written in clear English, this book explains why so many...
    TEXT
  13. 213
    by Firrar Utdirartatmo
    Published
    Subjects: ...Internet, hacking, vulnerability, malicious, exploit dan security hole adalah kosa kata yang sering...
    TEXT
  14. 214
    by Rahmat Rafiudin
    Published
    Subjects: ...Fokus utama buku ini membahas tentang security komputer untuk komputer-komputer berbasis sistem...
    TEXT
  15. 215
    by -
    Published
    Subjects: ... terhadap model enkripsi dan security data. Dalam hal i...
    TEXT
  16. 216
    by Adam Quiggle
    Published
    Subjects: ...VPNs (Virtual Private Networks) allow for secure communications over publicly shared infrastructure...
    TEXT
  17. 217
    by Andrew A. Vladimirov
    Published
    Subjects: ... administrator needs to know to deploy wireless networks securely. --Robert Haskins, Chief Technology Officer...
    TEXT
  18. 218
    by Robert C. Wible
    Published
    Subjects: ...This reference presents the guidelines you need to create safer, more secure buildings...
    TEXT
  19. 219
    by C.S.R. Prabhu
    Published
    Subjects: ... the demands of the present and of the future. Bluetooth is the most secure among all wireless technologies...
    TEXT
  20. 220
    by Securities Commission
    Published
    Subjects: ... Jurisprudence Syariah Criteria for Listed Securities Glos...
    TEXT