1-6
of
6
results
-
Pre-Owned Cryptography and Net...Our books are pre-loved which means they have been read before. We carefully c... Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in a - USED - VERY GOOD Condition condition. If you re not completely satisfied please get in touch & we ll be happy to help.... more
-
Pre-Owned Cryptography and Net...CONDITION – USED: Books sold are in GOOD or better condition. Good Condition... CONDITION – USED: Books sold are in GOOD or better condition. Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining... more
-
Pre-Owned Computer Security Fu...Good Condition: Minimal damage to the cover dust jacket may not be included mi... Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining acceptable on books as long as the text is readable and... more
-
Pre-Owned Network Security: Pr...Our books are pre-loved which means they have been read before. We carefully c... Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in a - USED - VERY GOOD Condition condition. If you re not completely satisfied please get in touch & we ll be happy to help.... more
-
Pre-Owned Counter Hack: A Step...Soil quality is threatened by human activity but can also be improved by our i... Soil quality is threatened by human activity but can also be improved by our intervention. This book is a valuable compendium of work on the concept of the Anthroscape that highlights the potential contribution of such research to sustainable... more
-
Pre-Owned DB2 for Z/OS Version...Focusing on running DB2 in z/OS environments this is a guide to DB2 z/OS datab... Focusing on running DB2 in z/OS environments this is a guide to DB2 z/OS database administration. It covers database planning design implementation operation recovery security performance and more. It is useful for those preparing for IBM Certified... more
Ads related to cyber security cryptography research
Shopping for the best deal on Cyber security cryptography research Computer Books - Select a product below or see other matches to read product reviews, compare prices and store ratings.