141
Security risk management : building an information security risk management program from the ground up [E-Book] /
142
Divining a digital future : mess and mythology in ubiquitous computing [E-Book] /
143
Building successful online communities : evidence-based social design [E-Book] /
144
Internet of things : global technological and societal trends [E-Book] /
145
Computer Forensics jumpstart / [E-Book]
146
CompTIA security+ deluxe study guide / [E-Book]
147
PCI DSS : a practical guide to implementing and maintaining compliance [E-Book] /
148
Securing the cloud : cloud computer security techniques and tactics [E-Book] /
149
Zenoss core 3.x network and system monitoring : a step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system [E-Book] /
150
Use of risk analysis in computer-aided persuasion [E-Book]/
151
Zabbix 1.8 network monitoring : monitor your network's hardware, servers, and Web performance effectively and efficiently [E-Book] /
152
Security in ad hoc and sensor networks / [E-Book]
153
China's cyberwarfare capability / [E-Book]
154
Managing information security / [E-Book]
155
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009 / [E-Book]
156
Mac security bible / [E-Book]
157
CEH : certified ethical hacker study guide [E-Book] /
158
IT audit, control, and security / [E-Book]
159
Dot com mantra : social computing in the Central Himalayas [E-Book] /
160
CCNA certification all-in-one for dummies / [E-Book]