"synopsis" may belong to another edition of this title.
"About this title" may belong to another edition of this title.
Shipping:
US$ 3.99
Within U.S.A.
Book Description Condition: New. Seller Inventory # ABLIING23Mar2317530027076
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 1.09. Seller Inventory # Q-0890066922
Book Description HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9780890066928
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9780890066928_lsuk
Book Description HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9780890066928
Book Description Hardback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Seller Inventory # C9780890066928
Book Description Condition: New. KlappentextThis guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms. Seller Inventory # 898961765