Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Computer hackers, Electronic surveillance, Security systems, Data encryption (Computer science), Computer security, Inventions, Juvenile literature, Hackers, Automation, Crime prevention, juvenile literature, Electronics, juvenile literature, Computer crimes, Crime, juvenile literature, Cryptography, Criminals, Computer programming, juvenile literature, Criminals, juvenile literature, Inventions, juvenile literatureShowing 7 featured editions. View all 7 editions?
Edition | Availability |
---|---|
1 |
cccc
Libraries near you:
WorldCat
|
2 |
zzzz
Libraries near you:
WorldCat
|
3 |
aaaa
Libraries near you:
WorldCat
|
4 |
cccc
Libraries near you:
WorldCat
|
5 |
cccc
Libraries near you:
WorldCat
|
6 |
cccc
Libraries near you:
WorldCat
|
7 |
zzzz
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Home security
Panic rooms
Biometrics
Eyes and veins
Airports
Image and analysis
Surveillance
Spy planes
Credit cards
Bodyguards
Fort Knox
The beast
Need to know words
Did you know?
Security online.
Edition Notes
Includes bibliographical references (p. 31) and index.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created March 26, 2010
- 2 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
July 31, 2019 | Edited by MARC Bot | associate edition with work OL15026102W |
March 26, 2010 | Created by ImportBot | Imported from Library of Congress MARC record |