Search Results

  1. 861

    International business. by Woods, Margaret, 1954-

    Published 1996
    Book
  2. 862

    GSEC GIAC security essentials certification exam guide by Messier, Ric

    Book
  3. 863

    Hacking exposed mobile security secrets & solutions by Bergman, Neil

    Published 2013
    Book
  4. 864

    Hacking exposed unified communications & VoIP security secrets & solutions by Collier, Mark D., Endler, David

    Published 2014
    Book
  5. 865

    LPI Linux essentials certification exam guide by Tracy, Robb H.

    Published 2013
    Book
  6. 866

    Networking a beginner's guide by Hallberg, Bruce A. 1964-

    Published 2014
    Book
  7. 867
  8. 868

    Software engineering a practitioner's approach by Pressman, Roger S., Maxim, Bruce R.

    Published 2015
    Book
  9. 869

    Cyber warfare techniques, tactics and tools for security practitioners by Andrees, Jason, Winterfeld, Steve

    Published 2014
    Book
  10. 870

    Everyone a leader a grassroots model for the new workplace by Horst

    Book
  11. 871

    Principles of big data preparing, sharing, and analyzing complex information by Berman, Jules J.

    Published 2013
    Book
  12. 872

    Hacking with kali practical penetration testing techniques by Broad, James

    Published 2014
    Book
  13. 873
  14. 874

    Eleventh hour CISSP study guide by Conrad, Eric

    Published 2014
    Book
  15. 875

    Social Media security leveraging social networking while mitigating by Cross, Michael 1965-

    Published 2013
    Book
  16. 876

    CCTV from light to pixels by Damjanovski, Vlado 1956-

    Published 2014
    Book
  17. 877
  18. 878

    Crime prevention through environmental design by Crowe, Timothy D

    Published 2013
    Book
  19. 879

    Chinese industrial espionage technology acquisition and military modernization by Hannas, William C. 1946-

    Published 2013
    Book
  20. 880

    Inside out, India and China local politics go global by Antholis, William

    Published 2013
    Book