Using SET for secure electronic commerce
| Main Author: | DREW |
|---|---|
| Format: | Book |
| Published: |
New Jersey:
Prentice Hall,
1998.
|
| Subjects: |
Similar Items
-
E-Commerce security : weak links, best defenses
by: Ghosh
Published: (1998) -
mCommerce security : a beginner's guide
by: RAINA
Published: (2002) -
Schaum's outline of theory and problems of set theory and related topics
by: Lipschutz
Published: (1981) -
Naive set theory
by: Halmos
Published: (1960) -
Security+ guide to network security fundamentals
by: Campbell
Published: (2003)


