Sold Out
Book Categories |
Guest Editor's Introduction | 1 | |
Rewriting Histories: Recovering from Malicious Transactions | 3 | |
Secure Concurrency Control in Firm Real-Time Database Systems | 37 | |
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments | 81 | |
Providing Security and Interoperation of Heterogeneous Systems | 115 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity of Data and Transaction Processing
X
This Item is in Your InventorySecurity of Data and Transaction Processing
X
You must be logged in to review the productsX
X
X
Add Security of Data and Transaction Processing, Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into, Security of Data and Transaction Processing to the inventory that you are selling on WonderClubX
X
Add Security of Data and Transaction Processing, Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into, Security of Data and Transaction Processing to your collection on WonderClub |