Items 16 - 30 of 110
1 2 3 4 5 6 7 >
Sort: 

How to Become an IT Architect
How to Become an IT Architect
By (author): Cristian Bojinca
Published: 10/31/2016
Pages: 300
SSL and TLS: Theory and Practice ,Second Edition
SSL and TLS: Theory and Practice ,Second Edition
By (author): Rolf Oppliger
Published: 03/31/2016
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
By (author): Edward Humphreys
Published: 02/29/2016
Pages: 224
Medical Device Software Verification, Validation, and Compliance
Medical Device Software Verification, Validation, and Compliance
By (author): David A. Vogel
Published: 02/02/2016
Pages: 428
Information Hiding
Information Hiding
Published: 12/20/2015
Pages: 312
SIP:Understanding the Session Initiation Protocol, Fourth Edition
SIP:Understanding the Session Initiation Protocol, Fourth Edition
By (author): Alan B. Johnston
Published: 10/31/2015
Pages: 530
Coming Soon: Available 10/31/2015
Security for Cloud Computing
Security for Cloud Computing
Published: 09/30/2015
Pages: 184
Software Configuration Management Handbook, Third Edition
Software Configuration Management Handbook, Third Edition
By (author): Alexis Leon
Published: 01/31/2015
Pages: 436
Guide to Advanced Software Testing, Second Edition
Guide to Advanced Software Testing, Second Edition
By (author): Anne Mette Hass
Published: 10/30/2014
Pages: 476
Secure Messaging on the Internet
Secure Messaging on the Internet
By (author): Rolf Oppliger
Published: 07/31/2014
Pages: 282
Cryptography for Security and Privacy in Cloud Computing
Cryptography for Security and Privacy in Cloud Computing
By (author)s: Stefan Rass, Daniel Slamanig
Published: 10/31/2013
Pages: 260
Engineering Safe and Secure Software Systems
Engineering Safe and Secure Software Systems
By (author): C. Warren Axelrod
Published: 11/30/2012
Pages: 350
1 2 3 4 5 6 7 >