Author: John Paul Mueller
Publisher: John Wiley & Sons
ISBN: 0782151825
Category : Computers
Languages : en
Pages : 495
Book Description
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to teach you the right techniques for most scenarios you're likely to encounter. This is not an introduction to security; it's an advanced cookbook that shows experienced programmers how to meet tough security challenges: Recognize and avoid dangerous traps—including holes in .NET Work fluently with both role-based and code access security Maximize the security advantages of policies and code groups Promote security using Active Directory Secure data with .NET cryptographic techniques Meet the toughest LAN security requirements Tackle special security issues associated with Web and wireless applications Implement Win32 API security in managed applications Uniting this instruction is a coherent, cohesive mindset that will help you take the human factor into account at every step. You'll become technically proficient with all the tools at your disposal—and, at the same time, you'll learn to make your solutions more powerful by crafting them in ways that dovetail with users' needs—and foibles—and anticipate cracker exploits.
.NET Development Security Solutions
Author: John Paul Mueller
Publisher: John Wiley & Sons
ISBN: 0782151825
Category : Computers
Languages : en
Pages : 495
Book Description
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to teach you the right techniques for most scenarios you're likely to encounter. This is not an introduction to security; it's an advanced cookbook that shows experienced programmers how to meet tough security challenges: Recognize and avoid dangerous traps—including holes in .NET Work fluently with both role-based and code access security Maximize the security advantages of policies and code groups Promote security using Active Directory Secure data with .NET cryptographic techniques Meet the toughest LAN security requirements Tackle special security issues associated with Web and wireless applications Implement Win32 API security in managed applications Uniting this instruction is a coherent, cohesive mindset that will help you take the human factor into account at every step. You'll become technically proficient with all the tools at your disposal—and, at the same time, you'll learn to make your solutions more powerful by crafting them in ways that dovetail with users' needs—and foibles—and anticipate cracker exploits.
Publisher: John Wiley & Sons
ISBN: 0782151825
Category : Computers
Languages : en
Pages : 495
Book Description
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to teach you the right techniques for most scenarios you're likely to encounter. This is not an introduction to security; it's an advanced cookbook that shows experienced programmers how to meet tough security challenges: Recognize and avoid dangerous traps—including holes in .NET Work fluently with both role-based and code access security Maximize the security advantages of policies and code groups Promote security using Active Directory Secure data with .NET cryptographic techniques Meet the toughest LAN security requirements Tackle special security issues associated with Web and wireless applications Implement Win32 API security in managed applications Uniting this instruction is a coherent, cohesive mindset that will help you take the human factor into account at every step. You'll become technically proficient with all the tools at your disposal—and, at the same time, you'll learn to make your solutions more powerful by crafting them in ways that dovetail with users' needs—and foibles—and anticipate cracker exploits.
Network Security Technologies and Solutions (CCIE Professional Development Series)
Author: Yusuf Bhaiji
Publisher: Pearson Education
ISBN: 0132796740
Category : Computers
Languages : en
Pages : 700
Book Description
CCIE Professional Development Network Security Technologies and Solutions A comprehensive, all-in-one reference for Cisco network security Yusuf Bhaiji, CCIE No. 9305 Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. “Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco. Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication technology Implement identity-based network access control Apply the latest wireless LAN security solutions Enforce security policy compliance with Cisco NAC Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instr
Publisher: Pearson Education
ISBN: 0132796740
Category : Computers
Languages : en
Pages : 700
Book Description
CCIE Professional Development Network Security Technologies and Solutions A comprehensive, all-in-one reference for Cisco network security Yusuf Bhaiji, CCIE No. 9305 Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. “Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco. Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication technology Implement identity-based network access control Apply the latest wireless LAN security solutions Enforce security policy compliance with Cisco NAC Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instr
Integrated Security Technologies and Solutions - Volume II
Author: Aaron Woland
Publisher: Cisco Press
ISBN: 0134807677
Category : Computers
Languages : en
Pages : 1017
Book Description
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation
Publisher: Cisco Press
ISBN: 0134807677
Category : Computers
Languages : en
Pages : 1017
Book Description
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation
Programming .NET Security
Author: Adam Freeman
Publisher: "O'Reilly Media, Inc."
ISBN: 0596552270
Category : Computers
Languages : en
Pages : 717
Book Description
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to: use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data. use COM+ component services in a secure manner If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596552270
Category : Computers
Languages : en
Pages : 717
Book Description
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to: use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data. use COM+ component services in a secure manner If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.
BEGINNING ASP.NET SECURITY
Author: Barry Dorrans
Publisher:
ISBN: 9788126525966
Category :
Languages : en
Pages : 440
Book Description
Market_Desc: Beginning ASP.NET 3.5 Security is for beginning to intermediate ASP.NET developers who are new to ASP.NET but understand basics such as web forms, and code behind. Readers should understand how to build a basic ASP.NET web site but may have no previous knowledge of security. Readers should have an understanding of C#/VB.NET as well as HTML/XHTML and JavaScript. Special Features: " Popular Technology - ASP.NET is Microsoft's web application framework and is used by millions of developers worldwide. ASP.NET is used by C# and VB.NET developers and can be used for SharePoint applications" Leading Brand - Wrox is the leading publisher in the .NET space and in ASP.NET in particular" Expert Author - Barry Dorrans is an MVP in the security category and frequently writes and speaks on the subject" Must know information - According to The Open Web Application Security Project (OWASP) there are more than 300 issues that must be addressed to ensure a web application is secured properly" Risks at an all time high - Security attacks on internal and external web applications are at an all time high and can lead to loss of revenues and identity theft. More than 126 million records worldwide were stolen in 2007 (AP)." Requested Coverage - Feedback from Wrox's reader forums as well as the Author's speaking engagements indicate that readers are looking for coverage of ASP.NET security at the introductory level About The Book: Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and best practices, code libraries and resources provided by Microsoft and others.Beginning ASP.NET 3.5 Security provides a step by step solution to securing each area of ASP.NET development by providing a practical approach and providing references to examples of web sites that have suffered the exploits and additional material which will inspire readers to investigate and learn more. Readers can check their learning through exercise questions.
Publisher:
ISBN: 9788126525966
Category :
Languages : en
Pages : 440
Book Description
Market_Desc: Beginning ASP.NET 3.5 Security is for beginning to intermediate ASP.NET developers who are new to ASP.NET but understand basics such as web forms, and code behind. Readers should understand how to build a basic ASP.NET web site but may have no previous knowledge of security. Readers should have an understanding of C#/VB.NET as well as HTML/XHTML and JavaScript. Special Features: " Popular Technology - ASP.NET is Microsoft's web application framework and is used by millions of developers worldwide. ASP.NET is used by C# and VB.NET developers and can be used for SharePoint applications" Leading Brand - Wrox is the leading publisher in the .NET space and in ASP.NET in particular" Expert Author - Barry Dorrans is an MVP in the security category and frequently writes and speaks on the subject" Must know information - According to The Open Web Application Security Project (OWASP) there are more than 300 issues that must be addressed to ensure a web application is secured properly" Risks at an all time high - Security attacks on internal and external web applications are at an all time high and can lead to loss of revenues and identity theft. More than 126 million records worldwide were stolen in 2007 (AP)." Requested Coverage - Feedback from Wrox's reader forums as well as the Author's speaking engagements indicate that readers are looking for coverage of ASP.NET security at the introductory level About The Book: Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and best practices, code libraries and resources provided by Microsoft and others.Beginning ASP.NET 3.5 Security provides a step by step solution to securing each area of ASP.NET development by providing a practical approach and providing references to examples of web sites that have suffered the exploits and additional material which will inspire readers to investigate and learn more. Readers can check their learning through exercise questions.
ASP.NET Core Security
Author: Christian Wenz
Publisher: Simon and Schuster
ISBN: 1633439984
Category : Computers
Languages : en
Pages : 366
Book Description
ASP.NET Core Security teaches you the skills and countermeasures you need to keep your ASP.NET Core apps secure from the most common web application attacks. With this collection of practical techniques, you will be able to anticipate risks and introduce practices like testing as regular security checkups. You’ll be fascinated as the author explores real-world security breaches, including rogue Firefox extensions and Adobe password thefts. The examples present universal security best practices with a sharp focus on the unique needs of ASP.NET Core applications.
Publisher: Simon and Schuster
ISBN: 1633439984
Category : Computers
Languages : en
Pages : 366
Book Description
ASP.NET Core Security teaches you the skills and countermeasures you need to keep your ASP.NET Core apps secure from the most common web application attacks. With this collection of practical techniques, you will be able to anticipate risks and introduce practices like testing as regular security checkups. You’ll be fascinated as the author explores real-world security breaches, including rogue Firefox extensions and Adobe password thefts. The examples present universal security best practices with a sharp focus on the unique needs of ASP.NET Core applications.
NET Framework Security
Author: Brian A. LaMacchia
Publisher: Addison-Wesley Professional
ISBN: 9780672321849
Category : Computers
Languages : en
Pages : 820
Book Description
A reference guide to the use of the security features available in Microsoft's .NET framework. Code samples and configuration techniques are explained. Sixteen chapters discuss user- and code-identity-based security, membership conditions and code groups, strong naming assemblies, hosting managed code, verification and validation, data transport integrity. Further chapters cover material specific to administration and development concerns. Annotation copyrighted by Book News, Inc., Portland, OR
Publisher: Addison-Wesley Professional
ISBN: 9780672321849
Category : Computers
Languages : en
Pages : 820
Book Description
A reference guide to the use of the security features available in Microsoft's .NET framework. Code samples and configuration techniques are explained. Sixteen chapters discuss user- and code-identity-based security, membership conditions and code groups, strong naming assemblies, hosting managed code, verification and validation, data transport integrity. Further chapters cover material specific to administration and development concerns. Annotation copyrighted by Book News, Inc., Portland, OR
DevSecOps for .NET Core
Author: Afzaal Ahmad Zeeshan
Publisher: Apress
ISBN: 1484258509
Category : Computers
Languages : en
Pages : 297
Book Description
Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not only learn the various stages in the DevOps pipeline through examples of solutions developed and deployed using .NET Core, but also go through open source SDKs and toolkits that will help you to incorporate automation, security, and compliance. The book starts with an outline of modern software engineering principles and gives you an overview of DevOps in .NET Core. It further explains automation in DevOps for product development along with security principles to improve product quality. Next, you will learn how to improve your product quality and avoid code issues such as SQL injection prevention, cross-site scripting, and many more. Moving forward, you will go through the steps necessary to make security, compliance, audit, and UX automated to increase the efficiency of your organization. You’ll see demonstrations of the CI phase of DevOps, on-premise and hosted, along with code analysis methods to verify product quality. Finally, you will learn network security in Docker and containers followed by compliance and security standards. After reading DevSecOps for .NET Core, you will be able to understand how automation, security, and compliance works in all the stages of the DevOps pipeline while showcasing real-world examples of solutions developed and deployed using .NET Core 3. What You Will Learn Implement security for the .NET Core runtime for cross-functional workloads Work with code style and review guidelines to improve the security, performance, and maintenance of components Add to DevOps pipelines to scan code for security vulnerabilities Deploy software on a secure infrastructure, on Docker, Kubernetes, and cloud environments Who This Book Is For Software engineers and developers who develop and maintain a secure code repository.
Publisher: Apress
ISBN: 1484258509
Category : Computers
Languages : en
Pages : 297
Book Description
Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not only learn the various stages in the DevOps pipeline through examples of solutions developed and deployed using .NET Core, but also go through open source SDKs and toolkits that will help you to incorporate automation, security, and compliance. The book starts with an outline of modern software engineering principles and gives you an overview of DevOps in .NET Core. It further explains automation in DevOps for product development along with security principles to improve product quality. Next, you will learn how to improve your product quality and avoid code issues such as SQL injection prevention, cross-site scripting, and many more. Moving forward, you will go through the steps necessary to make security, compliance, audit, and UX automated to increase the efficiency of your organization. You’ll see demonstrations of the CI phase of DevOps, on-premise and hosted, along with code analysis methods to verify product quality. Finally, you will learn network security in Docker and containers followed by compliance and security standards. After reading DevSecOps for .NET Core, you will be able to understand how automation, security, and compliance works in all the stages of the DevOps pipeline while showcasing real-world examples of solutions developed and deployed using .NET Core 3. What You Will Learn Implement security for the .NET Core runtime for cross-functional workloads Work with code style and review guidelines to improve the security, performance, and maintenance of components Add to DevOps pipelines to scan code for security vulnerabilities Deploy software on a secure infrastructure, on Docker, Kubernetes, and cloud environments Who This Book Is For Software engineers and developers who develop and maintain a secure code repository.
Signal
Author:
Publisher:
ISBN:
Category : Armed Forces
Languages : en
Pages : 854
Book Description
Publisher:
ISBN:
Category : Armed Forces
Languages : en
Pages : 854
Book Description
Encyclopedia of Information Science and Technology, First Edition
Author: Khosrow-Pour, D.B.A., Mehdi
Publisher: IGI Global
ISBN: 159140794X
Category : Education
Languages : en
Pages : 3807
Book Description
Comprehensive coverage of critical issues related to information science and technology.
Publisher: IGI Global
ISBN: 159140794X
Category : Education
Languages : en
Pages : 3807
Book Description
Comprehensive coverage of critical issues related to information science and technology.