It looks like you're offline.
Open Library logo
additional options menu
Last edited by RenameBot
September 1, 2008 | History

Karen Kent

17 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Who will save our schools?: teachers as constructivist leaders

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Where the West Begins: America's Plains & Prairies

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Portal and the Pendulum

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to computer security log management: recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to intrusion detection and prevention systems (IDPS): recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to Bluetooth security: recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Technical guide to information security testing and assessment: recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to storage encryption technologies for end user devices

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to enterprise telework and remote access security: recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to security for WiMAX technologies (draft): recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guide to integrating forensic techniques into incident response: recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Nightingale's Mask
    First published in 2006 1 edition in 1 language

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: On the Journey: A Resource Book for Catechists, Chaplains and All Who Pray With Young People

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Running on empty: home care services in Massachusetts

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Women entrepreneurs.
    First published in 2004 1 edition in 1 language

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Guidance for securing Microsoft Windows XP Home Edition: a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Inside Network Perimeter Security (2nd Edition) (Inside)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
September 1, 2008 Edited by RenameBot fix author name
April 1, 2008 Created by an anonymous user initial import