Buy Used and New Security Books

Results for Security

Showing 433 to 444 of 1,001 results
Fourier Acoustics: Sound Radiation and Nearfield Acoustical Holography Fourier Acoustics: Sound Radiation and Nearfield Acoustical Holography by Earl G. Williams

Fourier Acoustics: Sound Radiation and Nearfield Acoustical Holography

by Earl G. Williams


ISBN 13: 9780127539607

Format: Hardcover (306 pages)
Publisher: Academic Press
Published: 10 Jun 1999

Save for later

 
New : $106.44  
New : $106.44
Hacking: The Art of Exploitation, 2nd Edition Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson

Hacking: The Art of Exploitation, 2nd Edition

by Jon Erickson


ISBN 13: 9781593271442

Format: Paperback (480 pages)
Publisher: No Starch Press
Published: 07 Feb 2008

Save for later

 
New : $39.77  
New : $39.77
Smart Home Hacks: Tips and Tools for Automating your House Smart Home Hacks: Tips and Tools for Automating your House by Gordon Meyer

Smart Home Hacks: Tips and Tools for Automating your House

by Gordon Meyer


ISBN 13: 9780596007225

Format: Illustrated (375 pages)
Publisher: O'Reilly Media
Published: 25 Oct 2004

Save for later

 
New : $30.20  
New : $30.20
Learning from Disasters Learning from Disasters by Brian Toft,Simon Reynolds

Learning from Disasters

by Brian Toft,Simon Reynolds


ISBN 13: 9781899287758

Format: Illustrated (153 pages)
Publisher: Palgrave Macmillan
Published: 01 Jul 2005
Other Format: Hardcover

Save for later

 
New : $107.58  
New : $107.58
Seven Deadliest Microsoft Attacks (Seven Deadliest Attacks) Seven Deadliest Microsoft Attacks (Seven Deadliest Attacks) by Brian Barber, Rob Kraus, Mike Borkin, Naomi Alpern

Seven Deadliest Microsoft Attacks (Seven Deadliest Attacks)

by Brian Barber, Rob Kraus, Mike Borkin, Naomi Alpern


ISBN 13: 9781597495516

Format: Paperback (192 pages)
Publisher: Syngress
Published: 06 May 2010

Save for later

 
New : $27.79  
New : $27.79
Replication: Theory and Practice: 5959 (Lecture Notes in Computer Science, 5959) Replication: Theory and Practice: 5959 (Lecture Notes in Computer Science, 5959) by Bernadette Charron-Bost,Fernando Pedone,Andre Schiper

Replication: Theory and Practice: 5959 (Lecture Notes in Computer Science, 5959)

by Bernadette Charron-Bost,Fernando Pedone,Andre Schiper


ISBN 13: 9783642112935

Format: Illustrated (305 pages)
Publisher: Springer
Published: 02 Mar 2010

Save for later

 
New : $66.50  
New : $66.50
Digital Privacy: Theory, Technologies, and Practices Digital Privacy: Theory, Technologies, and Practices by

Digital Privacy: Theory, Technologies, and Practices

by


ISBN 13: 9781420052176

Format: Hardcover (496 pages)
Publisher: Auerbach Publications
Published: 22 Dec 2007

Save for later

 
New : $135.58  
New : $135.58
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis by Colleen McCue

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis

by Colleen McCue


ISBN 13: 9780750677967

Format: Illustrated (364 pages)
Publisher: Butterworth-Heinemann
Published: 17 Oct 2006

Save for later

 
New : $64.12  
New : $64.12
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement by Dimitris N. Chorafas

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

by Dimitris N. Chorafas


ISBN 13: 9781420086171

Format: Hardcover (305 pages)
Publisher: Auerbach Publications
Published: 29 Oct 2008

Save for later

 
New : $130.36  
New : $130.36
Conquest in Cyberspace: National Security and Information Warfare Conquest in Cyberspace: National Security and Information Warfare by Martin C. Libicki

Conquest in Cyberspace: National Security and Information Warfare

by Martin C. Libicki


ISBN 13: 9780521692144

Format: Illustrated (336 pages)
Publisher: Cambridge University Press
Published: 16 Apr 2007

Save for later

 
New : $28.47  
New : $28.47