Building SET applications for secure transactions
Main Authors: | Merkow Mark S., Breithaupt Jim 1955-, Wheeler Ken L. 1955- |
---|---|
Format: | Book |
Language: | English |
Published: |
Wiley, J.
|
Similar Items
-
E-commerce security Weak links, best defenses
by: Ghosh Anup K.
Published: (1998) -
Web security A step-by-step reference guide
by: Stein Lincoln D.
Published: (1998) -
Home security Alarms, sensors and systems
by: Capel Vivian
Published: (1997) -
Διαχείριση της ασφάλειας πληροφοριών
by: Κάτσικας Σωκράτης Κ. 1960-
Published: (2014) -
Information security Protecting the global enterprise
by: Pipkin Donald L.
Published: (2000)