Verlag: Pearson Education, Limited, 2006
ISBN 10: 0321304861 ISBN 13: 9780321304865
Sprache: Englisch
Anbieter: Better World Books, Mishawaka, IN, USA
EUR 12,54
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbZustand: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
Verlag: Pearson Education, Limited, 2006
ISBN 10: 0321304861 ISBN 13: 9780321304865
Sprache: Englisch
Anbieter: Better World Books, Mishawaka, IN, USA
EUR 12,54
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Verlag: Addison-Wesley Professional, 2006
ISBN 10: 0321304861 ISBN 13: 9780321304865
Sprache: Englisch
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
EUR 13,20
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.15.
Verlag: Addison-Wesley Professional, 2006
ISBN 10: 0321304861 ISBN 13: 9780321304865
Sprache: Englisch
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
EUR 13,20
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.15.
Verlag: Mechanical Industry Press Pub. Date :2007-08, 2000
ISBN 10: 7111219732 ISBN 13: 9787111219736
Anbieter: liu xing, Nanjing, JS, China
EUR 53,08
Währung umrechnenAnzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: New. Language:Chinese.Pages Number: 25213 Publisher: Machinery Industry Press. Pub. Date :2007-08. This book covers the application and network security analysis and testing aspects. Divided into three parts. the first section discusses some of the realities. focuses on the production of vulnerability. security. software development life cycle. risk-based security testing and analysis: white box. black box and gray box testing; the second part is mainly found on the network analysis application an.