1
by Galloro, Giovanni, Avery, Nathaniel, Dorbin, David
Published 2024
Packt Publishing Ltd.
Table of Contents: ... -- Chapter 4: Securing Your Code with Cloud Workstations -- Technical requirements -- Introduction to Cloud...

2
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

3
by Lachance, Daniel
Published 2020
McGraw-Hill
Subjects: ...Computer networks / Security measures / Examinations / fast...

4
by Klett, Gerhard, Kersten, Heinrich
Published 2015
mitp
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

5
by Quintero, Dino, Baumann, Thomas, Cruz, Vera, Haldar, Nilabja
Published 2022
IBM Redbooks
Subjects: ...Information technology / Security measures / fast...

6
by Oliveira, Carlos A. S.
Published 2016
Apress, Distributed by Springer Science+Business Media New York
Subjects: ...Derivative securities / http://id.loc.gov/authorities/subjects/sh93005704...

7
Published 2012
BCS, the Chartered Institute for IT
Table of Contents: ...Nothing is permanent except changesection 5: security in the cloud; 10 protecting data in the cloud...

8
by Brooks, Charlotte
Published 2007
IBM, International Technical Support Organization
Subjects: ...Business / Data processing / Security measures / Planning...

9
by Scott, Charlie
Published 1999
O'Reilly
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10
by Bruno, Anthony, Jordan, Steve
Published 2024
Cisco Press
Subjects: ...Computer networks / Security measures / Examinations / Study guides...

11
by Loukides, Michael Kosta
Published 2022
O'Reilly Media, Inc.
Subjects: ...Computer security / Technological innovations...

12
by Garverick, Josh
Published 2018
Apress
Table of Contents: ...Data SecurityApplication Security; Identity and Access Management; Transport and Delivery Channels...

13
by Garrett, Robert
Published 2011
Apress
Table of Contents: ...; Solutions and Features; Monitoring; Backup and Restore; Security; Upgrade and Migration; General Application...

14
by Russell, Charlie
Published 2009
Microsoft Press
... for on-the-job results. Discover how to: Plan availability, security features, and fault tolerance into network...

15
by Burtenshaw, Jeff
Published 2022
Packt Publishing, Limited
Table of Contents: ... APIs in Python Using Domo Machine Learning Securing Assets Organizing the Team Establishing Standard...

16
by Carruthers, Andrew, Ahmed, Sahir
Published 2023
Apress
Table of Contents: ...Chapter 1: Maturing the Snowflake Data Cloud -- Chapter 2: PrivateLink -- Chapter 3: Security...

17
by Schwartz, Mark
Published 2019
IT Revolution
Table of Contents: ...: Innovation ; Bureaucracy and culture ; Side glance: Security ; Planning and reporting ; Side glance...

18
by Raj, Pethuru
Published 2012
Auerbach Publications
... of the contributing architectures of EA-business, information, application, integration, security, and technology...

19
by Ning, Huansheng
Published 2013
CRC Press, Taylor & Francis Group
Table of Contents: ... -- ch. 7. Session management -- ch. 8. Space-time consistency and location privacy -- ch. 9. Security...

20
by Trivedi, Vinay
Published 2014
Apress
Table of Contents: ... and understand your users -- 11. Performance and scalability -- 12. Security threats: To defend and protect...