Showing 141 - 160 results of 233 for search '"Security"', query time: 0.02s Refine Results
  1. 141
    by ---- NIIT Ltd.
    Published
    Subjects: ...Managing security on the Web is increasingly becoming the prime concern for computer and network...
    TEXT
  2. 142
    by -
    Published
    Subjects: ...Synopsis: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform...
    TEXT
  3. 143
    by Kapil Raina
    Published
    Subjects: ...Security is one of the highest strategic priorities that operators and mobile commerce service...
    TEXT
  4. 144
    by Anurag Harsh
    Published
    Subjects: ...Security is one of the highest strategic priorities that operators and mobile commerce service...
    TEXT
  5. 145
    by Chad Sullivan
    Published
    Subjects: ...Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host...
    TEXT
  6. 146
    by Matt Bishop
    Published
    Subjects: ...ntroduction to Computer Security draws upon Bishops widely praised Computer Security: Art...
    TEXT
  7. 147
    by Merike Kaeo
    Published
    Subjects: ...Designing Network Security, Second Edition is a practical guide designed to help you understand...
    TEXT
  8. 148
    by Kevin Archer
    Published
    Subjects: ... security on Voice Over Internet Protocol (VoIP) and networks. There are many books about security, but none...
    TEXT
  9. 149
    by James Core
    Published
    Subjects: ... security on Voice Over Internet Protocol (VoIP) and networks. There are many books about security, but none...
    TEXT
  10. 150
    by Chuck Cothren
    Published
    Subjects: ... security on Voice Over Internet Protocol (VoIP) and networks. There are many books about security, but none...
    TEXT
  11. 151
    Subjects: ...The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both...
    TEXT
  12. 152
    by David C. Knox
    Published
    Subjects: ...Synopsis: Oracle security expert David Knox explains how to design and develop an integrated...
    TEXT
  13. 153
    by Getting Started
    Published
    Subjects: ...The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both...
    TEXT
  14. 154
    Subjects: ...The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both...
    TEXT
  15. 155
    by John Chirillo
    Published
    Subjects: ...Learn how to conduct thorough security examinations via illustrations and virtual simulations A...
    TEXT
  16. 156
    by William Stallinngs
    Published
    Subjects: .... Public-Key Cryptography and Message Authentication.II. NETWORK SECURITY APPLICATIONS. 4. Authentication...
    TEXT
  17. 157
    by David Hucaby
    Published
    Subjects: ... Cisco Systems firewall security solutions. Whether a novice or experienced network security engineer...
    TEXT
  18. 158
    by Barbara A. Nadel
    Published
    Subjects: ...Synopsis: This book is a must-read for architects, landlords, security consultants and anyone else...
    TEXT
  19. 159
  20. 160
    by Lukeman, Josh
    Published 2000
    Subjects: ...1. Day trading (securiies). 2. Electronic trading of securities....
    TEXT