GALLIMARD. 2010. In-8. Broché. Bon état, Couv. convenable, Dos plié, Intérieur acceptable. 362 pages - achevé d'imprimer 2010. . . . Classification Dewey : 820-Littératures anglaise et anglo-saxonne
Reference : R150224227
ISBN : 207012827X
Traduit de l'anglais par Laurence Viallet Classification Dewey : 820-Littératures anglaise et anglo-saxonne
Le-livre.fr / Le Village du Livre
ZI de Laubardemont
33910 Sablons
France
05 57 411 411
Les ouvrages sont expédiés à réception du règlement, les cartes bleues, chèques , virements bancaires et mandats cash sont acceptés. Les frais de port pour la France métropolitaine sont forfaitaire : 6 euros pour le premier livre , 2 euros par livre supplémentaire , à partir de 49.50 euros les frais d'envoi sont de 8€ pour le premier livre et 2€ par livre supplémentaire . Pour le reste du monde, un forfait, selon le nombre d'ouvrages commandés sera appliqué. Tous nos envois sont effectués en courrier ou Colissimo suivi quotidiennement.
Reference : albb451f0d1b26837fb
Ryan Trost. Practical Intrusion Analysis. In English /Ryan Trost. Practical Intrusion Analysis. Prevention and Detection for Twenty-First Century Addison Wesley 2009, 455 pp. We have thousands of titles and often several copies of each title may be available. Please feel free to contact us for a detailed description of the copies available. SKUalbb451f0d1b26837fb.
Reference : alb7d71a7f6544c1970
Shipulin F.K. Intrusion and ore formation (Dashkesan example). In Russian /Shipulin F.K. Intruzii i rudoobrazovanie (na primere Dashkesana). L. Science 1968. Contact us for details or to request photos of available books. Delivery of this book could take longer than normal due to additional handling time before shipping, and no rush delivery options are available. Please let us know if you have a specific date by which you need to receive your order.SKUalb7d71a7f6544c1970
Reference : albf5fd9594290efc8b
Mandia K. Intrusion Protection. Computer Crime Investigation In Russian /Mandia K. Zashchita ot vtorzheniy.Rassledovanie kompyuternykh prestupleniy M. Laurie 2005. We have thousands of titles and often several copies of each title may be available. Please feel free to contact us for a detailed description of the copies available. The delivery of this book might be delayed beyond the usual timeframe due to extended processing and preparation before shipment, and faster shipping options are not offered. Please inform us if you need the order by a certain date or have a deadline.SKUalbf5fd9594290efc8b
Reference : alb94e45ab52188e0b5
Novak J. How to detect network intrusion. In Russian /Novak Dzh. Kak obnaruzhit vtorzhenie v set. Translation from English by M. LORI 2016. We have thousands of titles and often several copies of each title may be available. Please feel free to contact us for a detailed description of the copies available. The delivery of this book might be delayed beyond the usual timeframe due to extended processing and preparation before shipment, and faster shipping options are not offered. Please inform us if you need the order by a certain date or have a deadline.SKUalb94e45ab52188e0b5
Reference : alb90d267e6035b527b
Foster D. Creating intrusion-protected applications In Russian /Foster D. Sozdanie zashchishchennykh ot vtorzheniya prikladnykh programm: per. s angl. In Russian. M. DMK Press 2009. 784s. We have thousands of titles and often several copies of each title may be available. Please feel free to contact us for a detailed description of the copies available. SKUalb90d267e6035b527b