Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Seller: More Than Words, Waltham, MA, U.S.A.
Condition: Good. . . Before placing your order for please contact us for confirmation on the book's binding. Check out our other listings to add to your order for discounted shipping. All orders guaranteed and ship within 24 hours.
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Seller: Amazing Books Pittsburgh, Pittsburgh, PA, U.S.A.
Paperback. Condition: Very Good. clean and sturdy copy, unmarked. jn.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Language: English
Published by Oreilly & Associates Inc, 2005
ISBN 10: 0596008279 ISBN 13: 9780596008277
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. illustrated edition. 738 pages. 9.25x7.25x1.25 inches. In Stock.
Seller: moluna, Greven, Germany
Condition: New. There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. This work collects 34 essays from leading security and human-computer interaction researchers on auth.
Language: English
Published by Oreilly & Associates Inc, 2005
ISBN 10: 0596008279 ISBN 13: 9780596008277
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. illustrated edition. 738 pages. 9.25x7.25x1.25 inches. In Stock. This item is printed on demand.