No Image

Download 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival by Daniel G. Bachrach PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51pN8GTYG1L._SX331_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1484203682" class="description"> <p>By Daniel G. Bachrach</p> <p><p>In nontechnical language and fascinating type, <em>10 Don’ts in your electronic Devices</em>...
read more
No Image

Download PCI DSS : a Pocket Guide by Alan Calder; Nicki Carter PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/31WXxUPGwoL._SX310_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1849288437" class="description"> <p>By Alan Calder; Nicki Carter</p> This co...
read more
No Image

Download Security Administrator Street Smarts: A Real World Guide to by David R. Miller PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51S8HHXwbqL._SX396_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1118061160" class="description"> <p>By David R. Miller</p> Boost the abiliti...
read more
No Image

Download Cyberbullying by Peggy J. Parks PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/511I3cFYMsL._SX331_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1442251174" class="description"> <p>By Peggy J. Parks</p> </div> <a h...
read more
No Image

Download Stealing the network : how to own a continent by Russ Rogers; et al PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/61TWzrGaY0L._SX379_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1931836051" class="description"> <p>By Russ Rogers; et al</p> </div> ...
read more
No Image

Download Innovation in the Software Sector by Piotr Stryszowski, OECD Organisation for Economic PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51miZ41D%2BZL._SX350_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-9264063617" class="description"> <p>By Piotr Stryszowski, OECD Organisation fo...
read more
No Image

Download EnCase Computer Forensics -- The Official EnCE: EnCase by Steve Bunting PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51ngn8l4jwL._SX393_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-0470901063" class="description"> <p>By Steve Bunting</p> The professional, a...
read more
No Image

Download Internet and surveillance: the challenges of Web 2.0 and by Christian Fuchs PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/41l%2BxYSLxGL._SX329_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-0415633648" class="description"> <p>By Christian Fuchs</p> The net has bee...
read more
No Image

Download Public-Key Cryptography: State of the Art and Future by Thomas Beth, Markus Frisch, Gustavus J. Simmons PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/412ztwMXtjL._SX331_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-3540552154" class="description"> <p>By Thomas Beth, Markus Frisch, Gustavus J. Si...
read more
No Image

Download Protecting Networks with SATAN by Martin Freiss PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51cqsp%2BCmLL._SX378_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1565924258" class="description"> <p>By Martin Freiss</p> Devil (Security A...
read more
1 2 3 4