Visit our new collection website
www.collectionsforschool.co.uk
SCHOOL BOOKS
KEY STAGES
BEST SELLERS
BOOK AWARDS
NEW FICTION
HOME
FURTHER EDUCATION
SECONDARY
PRIMARY
COLLECTIONS
VIEW BASKET
CHECK-OUT
MY ACCOUNT
HELP
Title / ISBN13
ISBN / EAN
Author
Publisher
Series
Category
Email:
Subscribe to news & offers:
Need assistance?
Log In/Register
CATEGORY BROWSE
Arts
Agriculture
Biography
Business
Children's
Computing
Earth Sciences
Economics
Educational
Engineering
English Language Teaching (ELT)
Environment
Family
Fiction
Finance
Geography
Home
Humanities
Industry
Information
Information Technology
Interdisciplinary Subjects
Language
Law
Leisure Interests
Literature
Mathematics
Medicine
Planning
Practical Interests
Reference
Science
Social Sciences
Sport
Technology
Travel
Veterinary Science
ABOUT US
About Us
Contact Us
Terms & Conditions
Item Details
Title:
INFLUENCES ON THE ADOPTION OF MULTIFACTOR AUTHENTICATION
By:
Martin C. Libicki, Edward Balkovich, Brian A. Jackson
Format:
Paperback
List price:
£17.99
Our price:
£16.19
Discount:
10
% off
You save:
£1.80
ISBN 10:
0833052357
ISBN 13:
9780833052353
Availability:
Reprinting. This item may be subject to delays or cancellation.
Delivery rates
Stock:
Currently
0
available
Publisher:
RAND CORPORATION
Pub. date:
16 July, 2011
Pages:
62
Publication:
US
Imprint:
RAND Corporation
Returns:
Non-returnable
Some other items by this author:
9 TO 5 (PB)
A FRAMEWORK FOR PROGRAMMING AND BUDGETING FOR CYBERSECURITY (PB)
ALERT AND READY (PB)
AN ASSESSMENT OF THE ASSIGNMENTS AND ARRANGEMENTS OF THE EXECUTIVE AGENT FOR DOD BIOMETRICS AND STATUS REPORT ON THE DOD BIOMETRICS ENTERPRISE (PB)
AN ASSESSMENT OF THE U.S. ENVIRONMENTAL PROTECTION AGENCY'S NATIONAL ENVIRONMENTAL PERFORMANCE TRACK PROGRAM (PB)
ANALYSIS OF GOVERNMENT ACCOUNTABILITY OFFICE BID PROTESTS IN AIR FORCE SOURCE SELECTIONS OVER THE PAST TWO DECADES (PB)
ANTIMICROBIAL RESISTANCE (PB)
APTITUDE FOR DESTRUCTION (PB)
APTITUDE FOR DESTRUCTION (PB)
ASSESSING LIVING CONDITIONS IN IRAQ'S ANBAR PROVINCE IN 2009 (PB)
BREACHING THE FORTRESS WALL (PB)
BYTING BACK (PB)
CHALLENGES AND CHOICES FOR CRIME-FIGHTING TECHNOLOGY (PB)
COLLECTING THE DOTS (PB)
CONQUEST IN CYBERSPACE
CONQUEST IN CYBERSPACE (HB)
CONQUEST IN CYBERSPACE (PB)
CYBERDETERRENCE AND CYBERWAR (PB)
DEFENDING CYBERSPACE AND OTHER METAPHORS
DESIGN OF THE QATAR NATIONAL RESEARCH FUND
DOMINANT BATTLESPACE KNOWLEDGE
EFFICIENT AVIATION SECURITY (PB)
ELECTRONIC SURVEILLANCE OF MOBILE DEVICES (PB)
EMERGENCY RESPONDER INJURIES AND FATALITIES (PB)
ENDING F22A PRODUCTION (PB)
EVALUATING NOVEL THREATS TO THE HOMELAND (PB)
EVALUATING THE RELIABILITY OF EMERGENCY RESPONSE SYSTEMS FOR LARGE-SCALE INCIDENT OPERATIONS (PB)
EXPLORING TERRORIST TARGETING PREFERENCES (PB)
FOSTERING INNOVATION IN COMMUNITY AND INSTITUTIONAL CORRECTIONS (PB)
FOSTERING INNOVATION IN THE U.S. COURT SYSTEM (PB)
GETTING TO YES WITH CHINA IN CYBERSPACE (PB)
GLOBAL DEMOGRAPHIC CHANGE AND ITS IMPLICATIONS FOR MILITARY POWER
GLOBAL DEMOGRAPHIC CHANGE AND ITS IMPLICATIONS FOR MILITARY POWER (PB)
HACKERS WANTED (PB)
HIGH-PRIORITY INFORMATION TECHNOLOGY NEEDS FOR LAW ENFORCEMENT (PB)
HOW INSURGENCIES END (PB)
HOW TERRORIST GROUPS END (PB)
INTERNET FREEDOM AND POLITICAL SPACE (PB)
INTERNET FREEDOM SOFTWARE AND ILLICIT ACTIVITY (PB)
LIVING CONDITIONS IN ANBAR PROVINCE IN JUNE 2008 (PB)
MARKETS FOR CYBERCRIME TOOLS AND STOLEN DATA (PB)
PROTECTING EMERGENCY RESPONDERS (PB)
RAMIFICATIONS OF DARPA'S PROGRAMMING COMPUTATION ON ENCRYPTED DATA PROGRAM (PB)
ROOT CAUSE ANALYSES OF NUNN-MCCURDY BREACHES
ROOT CAUSE ANALYSES OF NUNN-MCCURDY BREACHES (PB)
SECURING AMERICA'S PASSENGER-RAIL SYSTEMS (PB)
SHARING THE DRAGON'S TEETH (PB)
SUSTAINING THE QATAR NATIONAL RESEARCH FUND (PB)
THE CHALLENGE OF DOMESTIC INTELLIGENCE IN A FREE SOCIETY (PB)
THE DEFENDER'S DILEMMA (PB)
THE FEDERAL VOTING ASSISTANCE PROGRAM AND THE ROAD AHEAD (PB)
THE ROLE OF LOGIC MODELING IN A COLLABORATIVE AND ITERATIVE RESEARCH PROCESS (PB)
THE THE OFFICE OF SCIENCE AND TECHNOLOGY POLICY BLUE RIBBON PANEL ON THE THREAT OF BIOLOGICAL TERRORISM DIRECTED AGAINST LIVESTOCK (PB)
U.S. CRIMINAL JUSTICE SYSTEM IN THE PANDEMIC ERA AND BEYOND
UNDERKILL (PB)
UNDERSTANDING THE ROLE OF DETERRENCE IN COUNTERTERRORISM SECURITY (PB)
WHAT MAKES INDUSTRIES STRATEGIC
WHAT SHOULD BE CLASSIFIED? (PB)
TOP SELLERS IN THIS CATEGORY
The Art of Intrusion
(Paperback)
By:
Kevin D. Mitnick, William L. Simon
John Wiley and Sons Ltd
Our Price :
£10.22
The Art of Invisibility
(Paperback)
By:
Kevin D. Mitnick, Robert Vamosi, Mikko Hypponen (Foreword)
Little, Brown & Company
Our Price :
£11.99
BTEC Nationals Information Technology
(Mixed media product)
By:
Jenny Phillips, Alan Jarvis, Mark Fishpool
Pearson Education Limited
Our Price :
£29.84
Data Driven Security
(Paperback)
By:
Jay Jacobs, Bob Rudis
John Wiley & Sons Inc
Our Price :
£34.19
Official (ISC)2 Guide to the CISSP CBK
(Hardback)
By:
Adam Gordon (Editor)
Apple Academic Press Inc.
Our Price :
£59.39
BROWSE FOR BOOKS IN RELATED CATEGORIES
COMPUTING AND INFORMATION TECHNOLOGY
computer communications & networking
network security
Information provided by
www.pickabook.co.uk
SHOPPING BASKET
Your basket is empty
Total Items:
0
Tweet this!
Stumble Upon
Blogger
Delicious
Digg
Facebook
AddThis
NEW
Ramadan and Eid al-Fitr
By:
SARA KHAN
A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
Learning
That''s My Story!: Drama for Confidence, Communication and C...
By:
ADAM POWER-ANNAND
The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
Learning
Power of 2
By:
DAVID JOSEPH SHARP
Learning
Reading Lessons
By:
CAROL ATHERTON
Easter
Greg the Sausage Roll: Egg-cellent Easter Adventure
By:
MARK HOYLE
Easter
Dear Easter Bunny
By:
MAXINE LEE-MACKIE
Easter
We''re Going on an Egg Hunt
By:
GOLDIE HAWK
Picture Book
Bowerbird
By:
JULIA DONALDSON
Picture Book
Mummy and Me
By:
LYDIA BRIGHT