Skip to content
VuFind
English
Ελληνικά
Language
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Page will reload when a filter is removed.
Reset Filters
Applied Filters:
Suggested Topics:
Remove Filter
Numerical analysis
Page will reload when a filter is removed.
Reset Filters
Show filters (1)
Suggested Topics:
Remove Filter
Numerical analysis
Building SET applications for...
Cite this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Permanent link
Building SET applications for secure transactions
Bibliographic Details
Main Authors:
Merkow Mark S.
,
Breithaupt Jim 1955-
,
Wheeler Ken L. 1955-
Format:
Book
Language:
English
Published:
Wiley, J.
Holdings
Description
Similar Items
Staff View
Similar Items
E-commerce security Weak links, best defenses
by: Ghosh Anup K.
Published: (1998)
Web security A step-by-step reference guide
by: Stein Lincoln D.
Published: (1998)
Home security Alarms, sensors and systems
by: Capel Vivian
Published: (1997)
Διαχείριση της ασφάλειας πληροφοριών
by: Κάτσικας Σωκράτης Κ. 1960-
Published: (2014)
Information security Protecting the global enterprise
by: Pipkin Donald L.
Published: (2000)