Hacking point of sale
| Main Author: | Gomzin, Slava |
|---|---|
| Format: | Book |
| Published: |
Indianapolis :
John Wiley & Sons, Inc. ,
2014
|
| Subjects: |
Similar Items
Awas, pengguna kad kredit!
Published: (2009)
Published: (2009)
PCI compliance : understand and implement effective PCI data security standard compliance
by: Chuvakin, Anton A.
Published: (2010)
by: Chuvakin, Anton A.
Published: (2010)
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Hacking exposed fifth edition : network security secrets and solutions
by: McClure, Stuart
Published: (2005)
by: McClure, Stuart
Published: (2005)
How you can profit from credit cards : using credit to improve your financial life and bottom line
by: Arnold, Curtis E
Published: (2008)
by: Arnold, Curtis E
Published: (2008)
INTERNET CONTENT REGULATION : CONTEMPORARY LEGAL AND REGULATORY ISSUES IN THE CHANGING DIGITAL LANDSCAPE
by: Mahyuddin Daud
Published: (2021)
by: Mahyuddin Daud
Published: (2021)
Point of purchase : graphic interventions
Published: (2008)
Published: (2008)
Kad kredit
by: Othman Kasim
Published: (2006)
by: Othman Kasim
Published: (2006)
Anti-hacker tool kit
by: Shema,Mike
Published: (2014)
by: Shema,Mike
Published: (2014)
Anti-Hacker tool kit
by: Jones, Keith J.
Published: (2002)
by: Jones, Keith J.
Published: (2002)
Hacking exposed wireless : wireless security secrets and solutions
by: Wright, Joshua
Published: (2015)
by: Wright, Joshua
Published: (2015)
Managing cybersecurity resources : a cost-benefit analysis
by: Gordon, Lawrence A.
Published: (2006)
by: Gordon, Lawrence A.
Published: (2006)
Security strategy : from requirements to reality
by: Stackpole, Bill
Published: (2011)
by: Stackpole, Bill
Published: (2011)
Information technology security
Published: (2006)
Published: (2006)
Credit card stress busters
by: Tait, Allison
Published: (2009)
by: Tait, Allison
Published: (2009)
Business continuity planning for data centers and systems : A strategic implementation guide
by: Bowman, Ronald H.
Published: (2008)
by: Bowman, Ronald H.
Published: (2008)
Privacy and digital security
by: Fromm, Megan
Published: (2015)
by: Fromm, Megan
Published: (2015)
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data
by: Mitnick, Kevin
Published: (2017)
by: Mitnick, Kevin
Published: (2017)
Hacking exposed web applications
by: Scambray, Joel
Published: (2002)
by: Scambray, Joel
Published: (2002)
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)
by: Grimes, Roger A.
Published: (2021)
Data-driven security
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
IT governance
by: Calder, Alan
Published: (2012)
by: Calder, Alan
Published: (2012)
The active points test : a clinical test for identifying and selecting effective points for acupunture and related therapies
Published: (2015)
Published: (2015)
Managing credit risk : The great challenge for global financial markets
Published: (2008)
Published: (2008)
Auditing cloud computing : a security and privacy guide
Published: (2011)
Published: (2011)
Hands on Hacking
by: Hickey, Matthew, et al.
Published: (2020)
by: Hickey, Matthew, et al.
Published: (2020)
Your credit score : how to fix, improve and protect the 3-digit number that shapes your financial future
by: Weston, Liz Pulliam
Published: (2007)
by: Weston, Liz Pulliam
Published: (2007)
Your credit score : how to improve the 3-digit number that shapes your financial future
by: weston, Liz
Published: (2012)
by: weston, Liz
Published: (2012)
Your score : an insider's secrets to understanding, controlling, and protecting your credit score
by: Davenport, Anthony
Published: (2018)
by: Davenport, Anthony
Published: (2018)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
Credit risk modeling : design and application
Published: (1998)
Published: (1998)
CLOUD SECURITY : A GENERAL GUIDE TO SECURED COMPUTING
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Essentials of online payment security and fraud prevention
by: Montague, David
Published: (2011)
by: Montague, David
Published: (2011)
Home security
by: Conway, D G
Published: (2010)
by: Conway, D G
Published: (2010)
Microsoft PowerPoint
by: Mohd Noor Zakaria
Published: (2000)
by: Mohd Noor Zakaria
Published: (2000)
Rich dad's guide to becoming rich without cutting up your credit cards
by: Kiyosaki, Robert T.
Published: (2003)
by: Kiyosaki, Robert T.
Published: (2003)
Documentary credits (Letters of Credit) and collection for the export and import trade
by: Pang, Johnson Yok
Published: (1992)
by: Pang, Johnson Yok
Published: (1992)
Elak bahana hutang
by: Muhamad Ridzuan Amin
Published: (2009)
by: Muhamad Ridzuan Amin
Published: (2009)
Managing credit
by: Shaw, Adam
Published: (2003)
by: Shaw, Adam
Published: (2003)
The credit derivatives handbook : global perspectives, innovations, and market drivers
Published: (2008)
Published: (2008)
Similar Items
-
Awas, pengguna kad kredit!
Published: (2009) -
PCI compliance : understand and implement effective PCI data security standard compliance
by: Chuvakin, Anton A.
Published: (2010) -
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart
Published: (2009) -
Hacking exposed fifth edition : network security secrets and solutions
by: McClure, Stuart
Published: (2005) -
How you can profit from credit cards : using credit to improve your financial life and bottom line
by: Arnold, Curtis E
Published: (2008)