Buy Used and New Network Security Books

Results for Network Security

Showing 445 to 456 of 883 results
CISO Soft Skills CISO Soft Skills by Ron Collette,Michael Gentile,Skye Gentile

CISO Soft Skills

by Ron Collette,Michael Gentile,Skye Gentile


ISBN 13: 9781420089103

Format: Hardcover (288 pages)
Publisher: Auerbach Publications
Published: 21 Nov 2008

Save for later

 
New : $74.10  
New : $74.10
Biologically Inspired Algorithms for Financial Modelling (Natural Computing Series) Biologically Inspired Algorithms for Financial Modelling (Natural Computing Series) by Anthony Brabazon,Michael O'Neill

Biologically Inspired Algorithms for Financial Modelling (Natural Computing Series)

by Anthony Brabazon,Michael O'Neill


ISBN 13: 9783540262527

Format: Hardcover (275 pages)
Publisher: Springer
Published: 16 Dec 2005

Save for later

 
New : $114.65  
New : $114.65
Forensic Computing: A Practitioner's Guide (Practitioner Series) Forensic Computing: A Practitioner's Guide (Practitioner Series) by A J Sammes,Brian Jenkinson

Forensic Computing: A Practitioner's Guide (Practitioner Series)

by A J Sammes,Brian Jenkinson


ISBN 13: 9781846283970

Format: Hardcover (470 pages)
Publisher: Springer
Published: 03 Aug 2007
Other Format: Paperback

Save for later

 
New : $94.38  
New : $94.38
Digital Privacy: Theory, Technologies, and Practices Digital Privacy: Theory, Technologies, and Practices by

Digital Privacy: Theory, Technologies, and Practices

by


ISBN 13: 9781420052176

Format: Hardcover (496 pages)
Publisher: Auerbach Publications
Published: 22 Dec 2007

Save for later

 
New : $124.95  
New : $124.95
Building an Enterprise-wide Business Continuity Program Building an Enterprise-wide Business Continuity Program by Kelley Okolita

Building an Enterprise-wide Business Continuity Program

by Kelley Okolita


ISBN 13: 9781420088649

Format: Hardcover (344 pages)
Publisher: Auerbach Publications
Published: 08 Sep 2009

Save for later

 
New : $89.61  
New : $89.61
Securing IM and P2P Applications for the Enterprise Securing IM and P2P Applications for the Enterprise by Marcus Sachs,Paul Piccard

Securing IM and P2P Applications for the Enterprise

by Marcus Sachs,Paul Piccard


ISBN 13: 9781597490177

Format: Paperback (650 pages)
Publisher: Syngress
Published: 12 Dec 2005

Save for later

 
New : $45.39  
New : $45.39
Access Control, Security and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series) Access Control, Security and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series) by Shiu-Kai Chin,Susan Beth Older

Access Control, Security and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series)

by Shiu-Kai Chin,Susan Beth Older


ISBN 13: 9781584888628

Format: Hardcover (351 pages)
Publisher: Chapman and Hall/CRC
Published: 03 Aug 2010

Save for later

 
New : $114.99  
New : $114.99
Management of Heterogeneous and Autonomous Database Systems (The Morgan Kaufmann Series in Data Management Systems) Management of Heterogeneous and Autonomous Database Systems (The Morgan Kaufmann Series in Data Management Systems) by Ahmed K. Elmagarmid, Marek Rusinkiewicz, Amit Sheth

Management of Heterogeneous and Autonomous Database Systems (The Morgan Kaufmann Series in Data Management Systems)

by Ahmed K. Elmagarmid, Marek Rusinkiewicz, Amit Sheth


ISBN 13: 9781558602168

Format: Hardcover (432 pages)
Publisher: Morgan Kaufmann
Published: 27 Nov 1998

Save for later

 
New : $81.24  
New : $81.24
The Database Hacker's Handbook: Defending Database Servers The Database Hacker's Handbook: Defending Database Servers by David Litchfield,Chris Anley,John Heasman,Bill Grindlay

The Database Hacker's Handbook: Defending Database Servers

by David Litchfield,Chris Anley,John Heasman,Bill Grindlay


ISBN 13: 9780764578014

Format: Paperback (500 pages)
Publisher: John Wiley & Sons
Published: 15 Jul 2005

Save for later

 
New : $28.70  
New : $28.70