-
61
Disappearing cryptography : information hiding, steganography & watermarking /
Published 2009CONNECT
Electronic eBook -
62
-
63
-
64
The future does not compute : transcending the machines in our midst /
Published 1995CONNECT
Electronic eBook -
65
The web application hacker's handbook : discovering and exploiting security flaws /
Published 2008CONNECT
Electronic eBook -
66
-
67
-
68
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger /
Published 2008CONNECT
Electronic eBook -
69
China 2.0 : the transformation of an emerging superpower-- and the new opportunities /
Published 2010CONNECT
Electronic eBook -
70
-
71
The dragonfly effect : quick, effective, and powerful ways to use social media to drive social change /
Published 2010CONNECT
Government Document Electronic eBook -
72
Pro Internet Explorer 8 & 9 development : developing powerful applications for the next generation of IE /
Published 2010CONNECT
Electronic eBook -
73
-
74
Should you believe Wikipedia? : online communities and the construction of knowledge /
Published 2022CONNECT
Electronic eBook -
75
Cyber Risks for Business Professionals : a Management Guide.
Published 2010CONNECT
CONNECT
Electronic eBook -
76
-
77
How to find a job on LinkedIn, Facebook, Twitter, and Google+ /
Published 2012CONNECT
Electronic eBook -
78
Navigating social media legal risks : safeguarding your business /
Published 2012CONNECT
Electronic eBook -
79
Internet and surveillance : the challenges of Web 2.0 and social media /
Published 2012CONNECT
Electronic eBook -
80