No Image

Download Public-key Cryptography: Baltimore by Paul Garrett, Daniel Lieman PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/41XJ0J32DEL._SX328_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-0821833650" class="description"> <p>By Paul Garrett, Daniel Lieman</p> This selection of articles grew out of an expository and instructional convention on public-key...
read more
No Image

Download Global Information Technologies: Concepts, Methodologies, by Felix Tan PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51THsuPHYaL._SX448_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1599049392" class="description"> <p>By Felix Tan</p> The more and more perva...
read more
No Image

Download Biometric Recognition: Challenges and Opportunities by Whither Biometrics Committee, National Research Council PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/41eGuYiQO1L._SX329_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-0309142075" class="description"> <p>By Whither Biometrics Committee, National Res...
read more
No Image

Download Innocent code: a security wake-up call for Web programmers by Sverre H. Huseby PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51lIxrL8KNL._SX402_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-B000PY4I0E" class="description"> <p>By Sverre H. Huseby</p> <ul> <li>This co...
read more
No Image

Download Phishing : cutting the identity theft line by Rachael Lininger PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/419dPfRMbRL._SX395_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-0764584987" class="description"> <p>By Rachael Lininger</p> "Phishing" is th...
read more
No Image

Download Net Neutrality: Towards a Co-Regulatory Solution by Christopher T. Marsden PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51zAntZPZUL._SX331_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1849660069" class="description"> <p>By Christopher T. Marsden</p> Web Neutra...
read more
No Image

Download Coastal Lagoons: Critical Habitats of Environmental Change by Michael J. Kennish, Hans W. Paerl PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/61VuSc%2Bj4eL._SX348_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1420088300" class="description"> <p>By Michael J. Kennish, Hans W. Paerl</p> ...
read more
No Image

Download Complete Guide to CISM Certification by Thomas R. Peltier PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51Y%2BMKe6ReL._SX315_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-0849353564" class="description"> <p>By Thomas R. Peltier</p> I supply this...
read more
No Image

Download The Best Damn Cisco Internetworking Book Period by Charles Riley PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51lZbZch6LL._SX408_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1931836914" class="description"> <p>By Charles Riley</p> The simplest rattli...
read more
No Image

Download CISSP: Certified Information Systems Security Professional by James M. Stewart, Ed Tittel, Mike Chapple PDF

<div> <div class="cover"> <img src="https://images-na.ssl-images-amazon.com/images/I/51SOOyzECUL._SX396_BO1,204,203,200_.jpg" /> </div> <div> <div id="desc-1118314174" class="description"> <p>By James M. Stewart, Ed Tittel, Mike Chapple<...
read more