Search Results

  1. 841

    Investigation on shaped charge penetration effect using various types of casing material by Mohammad Iqram Kamaruddin

    Published 2014
    Thesis Book
  2. 842

    Emerging trends in ICT security

    Published 2014
    Book
  3. 843

    Hacking point of sale payment application secrets, threats, and solutions by Gomzin, Slava

    Published 2014
    Book
  4. 844

    Data-Driven Security Analysis, Visualization and Dashboards by Jacobs, Jay

    Published 2014
    Book
  5. 845
  6. 846

    Microsoft big data solutions by Jorgensen

    Published 2014
    Book
  7. 847

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Book
  8. 848

    National business employment weekly guide to cover letters by BessonlhTaunee S

    Book
  9. 849

    The Browser Hacker's Handbook by Alcorn, Wade

    Published 2014
    Book
  10. 850

    Computer security handbook

    Published 2014
    Book
  11. 851

    Anti-hacker tool kit by Shema, Mike

    Published 2014
    Book
  12. 852

    CEH Certified Ethical Hacker exam guide exam guide by Walker, Matthew

    Published 2014
    Book
  13. 853

    Cryptography infosec pro guide by Oriyano, Sean-Philip

    Published 2013
    Book
  14. 854

    Android Security by Misra

    Book
  15. 855
  16. 856
  17. 857
  18. 858
  19. 859

    Issues in the Islamic movement 1980-81 (1400-1401)

    Published 1982
    Book
  20. 860