Home > Authors > Paul Piccard > Securing IM and P2P applications for the enterprise
Securing IM and P2P applications for the enterprise
See on goodreads | librarything
Recent activity
Rate this book to see your activity here.
3 Books Similar to Securing IM and P2P applications for the enterprise by Paul Piccard
Bookscovery readers who liked Securing IM and P2P applications for the enterprise also like
Combating spyware in the enterprise, Cyber Adversary Characterization and Combating spyware in the enterprise.
How many of these have you read?
Comments and reviews of Securing IM and P2P applications for the enterprise
Please sign in to leave a comment