Your search returned 9 results.

Sort
Results
1.
Web 2.0 Security : defending ajax, Ria, and Soa Shreeraj Shah; [edited by] Mitzi Koontz by
Publication details: Boston, MA Cengage Learning 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SHA.

2.
Hacking Web services Shreeraj Shah by
Publication details: Boston, MA Charles River Media c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 SHA.

3.
Hacking Web services Shreeraj Shah by
Publication details: Boston, MA Charles River Media c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.59 .S5154 2007 005.8.

4.
Web hacking : attacks and defense Stuart McClure, Saumil Shah, Shreeraj Shah by
Publication details: Boston Addison-Wesley c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: TK5105.59 .M483 2002 005.8.

5.
Web hacking : attacks and defense Stuart McClure, Saumil Shah, Shreeraj Shah by
Publication details: Boston Addison-Wesley c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.84 MCC.

6.
Web hacking : attacks and defense Stuart McClure, Saumil Shah, Shreeraj Shah by
Publication details: Boston Addison-Wesley c2002
Availability: No items available.

7.
Web hacking : attacks and defense Stuart McClure, Saumil Shah, Shreeraj Shah by
Publication details: Boston Addison-Wesley c2002
Availability: No items available.

8.
Web hacking : attacks and defense Stuart McClure, Saumil Shah, Shreeraj Shah by
Publication details: Boston Addison-Wesley c2002
Availability: No items available.

9.
Web hacking : attacks and defense Stuart McClure, Saumil Shah, Shreeraj Shah by
Publication details: Boston Addison-Wesley c2002
Availability: No items available.

Pages

Find us on the map

Powered by Koha