1
by Nahari, Hadi
Published 2011
Wiley Pub.
Table of Contents: ..." in Web commerce security -- 2: E-commerce security -- E-commerce basics -- Building blocks: your tools...

2
by Fitzgerald, Todd
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security...

3
by Doraiswamy, Arvind
Published 2009
IT Governance Pub.
Table of Contents: ...1. Approach to security testing -- 2. Basic tests and techniques -- 3. The tools of the trade -- 4...

4
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...

5
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ... -- ch. 13. User authentication methods -- ch. 14. Computer and network forensics -- ch. 15. Malware...

6
by Krantz, Matt
Published 2013
Wiley
Subjects: ...Investments / Computer network resources...

7
by Dunkerley, Mark
Published 2015
Packt Publishing
Table of Contents: ... with AirWatch; Device security; Workspace security; User security; Content security; E-mail security; Network...

8
by Hammer-Krabbe, Stephanie
Published 2013
Wiley
Subjects: ...Investments / Computer network resources...

9
by Calder, Alan
Published 2013
IT Governance Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10
by Biafore, Bonnie
Published 2004
O'Reilly
Subjects: ...Investments / Computer network resources...

11
by Swan, Melanie
Published 2015
O'Reilly
Subjects: ...Data encryption (Computer science) / fast...

12
by Belew, Shannon
Published 2012
Wiley
Table of Contents: ... -- Internet security -- Boosting sales -- Retail to e-tail -- Storefront selling -- Fundraising sites -- Niche...

13
by James, Lance
Published 2005
Syngress
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

14
by Boyce, Jim
Published 2007
Microsoft Press
Table of Contents: ... -- Automatically responding to messages -- Securing your system, messages, and identity -- Receiving messages...

15
by Antonopoulos, Andreas M.
Published 2017
O'Reilly
Table of Contents: ... -- Wallets -- Transactions -- Advanced transactions and scripting -- The Bitcoin network -- The blockchain...

16
by Prusty, Narayan
Published 2017
Packt Publishing
Subjects: ...COMPUTERS / Data Processing / bisacsh...

17
by Dannen, Chris
Published 2017
Apress
Table of Contents: ...; The Path to Better Money; Cryptoeconomics and Security; Back to the Good Old Days; Cryptochaos; The Power...

18
by Korper, Steffano
Published 2001
Academic Press
Table of Contents: ... Payment Systems -- 8. Know Your Infrastructure -- 9. Select the Right Commerce Vendor -- 10. Secure Your...

19
by Vliet, Jurg van
Published 2011
O'Reilly
Table of Contents: ...Working with AWS ServicesCommand-Line Tools; The AWS Console; Elastic Compute Cloud (EC2...

20
by Goetsch, Kelly
Published 2014
O'Reilly Media
Subjects: ...Cloud computing / bisacsh...