Items 16 - 30 of 112
1 2 3 4 5 6 7 >
Sort: 

How to Become an IT Architect
How to Become an IT Architect
By author: Cristian Bojinca
Published: 30/11/2016
Pages: 300
Bitcoin and Blockchain Security
Bitcoin and Blockchain Security
Published: 31/10/2016
Pages: 240
SSL and TLS: Theory and Practice, Second Edition
SSL and TLS: Theory and Practice, Second Edition
By (author): Rolf Oppliger
Published: 31/03/2016
Pages: 304
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
By (author): Edward Humphreys
Published: 29/02/2016
Pages: 224
Information Hiding
Information Hiding
Published: 20/12/2015
Pages: 312
SIP: Understanding the Session Initiation Protocol, Fourth Edition
SIP: Understanding the Session Initiation Protocol, Fourth Edition
By (author): Alan B. Johnston
Published: 31/10/2015
Pages: 530
Security for Cloud Computing
Security for Cloud Computing
Published: 30/09/2015
Pages: 184
Software Configuration Management Handbook, Third Edition
Software Configuration Management Handbook, Third Edition
By (author): Alexis Leon
Published: 31/01/2015
Pages: 436
Guide to Advanced Software Testing, 2nd Ed.
Guide to Advanced Software Testing, 2nd Ed.
By (author): Anne Mette Hass
Published: 30/10/2014
Pages: 476
Secure Messaging on the Internet
Secure Messaging on the Internet
By (author): Rolf Oppliger
Published: 31/07/2014
Pages: 282
Cryptography for Security & Privacy in Cloud Computing
Cryptography for Security & Privacy in Cloud Computing
By (author)s: Stefan Rass, Daniel Slamanig
Published: 31/10/2013
Pages: 260
Engineering Safe and Secure Software Systems
Engineering Safe and Secure Software Systems
By (author): C. Warren Axelrod
Published: 30/11/2012
Pages: 350
Medical Device Data and Modeling for Clinical Decision Making
Medical Device Data and Modeling for Clinical Decision Making
By (author): John Zaleski
Published: 31/10/2010
Pages: 358
1 2 3 4 5 6 7 >