"synopsis" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781435797529
Book Description Condition: New. Seller Inventory # ABLIING23Mar2411530258868
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9781435797529_lsuk
Book Description Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Seller Inventory # C9781435797529
Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9781435797529
Book Description PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781435797529
Book Description Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book provides the basic techniques for making personal computers resistant to cyber attack. It can help prevent the devastating personal and financial consequences of cyber criminal activity. While focused on the Windows 7 operating system, the techniques detailed in this book also apply to Apple OS-X and Linux. Seller Inventory # 9781435797529
Book Description Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnThis book provides the basic techniques for making personal computers resistant to cyber attack. It can help prevent the devastating personal and financial consequences of cyber criminal activity. While focused on the Windows 7 . Seller Inventory # 447666227