1
Published 2009
IT Governance Pub.
Subjects: ...Information technology / Security measures / fast...

2
by Long, Johnny, Gardner, Bill, Brown, Justin
Published 2016
Syngress
Table of Contents: ... collection framework -- chapter 6. Locating exploits and finding targets -- chapter 7. Ten simple security...

3
by Long, Johnny
Published 2008
Syngress Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

4
Published 2017
O'Reilly Media, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

5
by Townsend, James J.
Published 2004
Addison-Wesley
...Key topic coverage includes security feature integration, personalization, content management...

6
by Belew, Shannon
Published 2012
Wiley
Table of Contents: ... -- Internet security -- Boosting sales -- Retail to e-tail -- Storefront selling -- Fundraising sites -- Niche...

7
by Tan, Joseph K. H.
Published 2005
Jossey-Bass
Table of Contents: ... Sheps, Joseph Tan -- E-security : frameworks for privacy and security in e-health data integration...