Search alternatives:
"physician" » "physicians"

21
by Hernandez, Steven
Published 2012
CRC Press
Table of Contents: ... -- domain 10. Physical (environmental) security...

22
by Alexander, David
Published 2013
BCS Learning & Development Ltd.
Table of Contents: ...7 physical and environmental securitylearning outcomes; general controls; physical security...

23
by Beaver, Kevin
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ...; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical...

24
by Rountree, Derrick
Published 2013
Syngress
Table of Contents: ... this Book; 1 Introduction to Identity; 1.1 Introduction; 1.2 What Is Identity?; 1.2.1 Physical Identity...

25
by Archer, Scott E.
Published 2000
New Riders
Table of Contents: ... the results of the business assessment -- Analysing the IT administration model -- Analyzing the physical...

26
by Dhanjani, Nitesh
Published 2009
O'Reilly
Table of Contents: ...; Acknowledgments; Chapter 1. Intelligence Gathering: Peering Through the Windows to Your Organization; Physical...

27
by Bannan, James
Published 2016
Manning Publications
...Businesses rely on a complex patchwork of client computers, physical and virtual servers...

28
by Fullerton, Sean
Published 2001
Que
... covered include Domain Name Services and Active Directory, Logical and Physical Active Directory...

29
Published 2022
Expanding Security

30
by Dalziel, Henry
Published 2015
Syngress, an imprint of Elsevier
... information and intellectual property, physical infrastructure, employees, and reputation, has become...

31
by Beaver, Kevin
Published 2010
Wiley Pub.
Table of Contents: ... Methodology; Part II: Putting Ethical Hacking in Motion; Chapter 5: Social Engineering; Chapter 6: Physical...

32
by Middleton, Bruce
Published 2014
CRC Press
Table of Contents: ... If You Have Physical Access -- 12. Order of Operations for Your Tools -- 13. Using Your iPhone as a...

33
by Bidgoli, Hossein
Published 2006
John Wiley
Table of Contents: ...Preface -- Guide to The Handbook of Information Security -- Internal Security Threats -- Physical...

34
by Rhodes-Ousley, Mark
Published 2013
McGraw Hill Education
Table of Contents: ... Defense -- Secure the Physical Environment -- Harden the Operating System -- Keep Patches Updated...

35
by Dhru, Nidhish
Published 2018
Apress
Table of Contents: ... Information from Any Device; Swap Shifts with Another Nurse or Physician; Request Time Off; Training...

36
by Shackleford, Dave
Published 2013
Wiley
... practices, and strategies used for securing physical environments do not provide sufficient protection...

37
Published 2014
CRC Press, Taylor & Francis Group
... prevention, anomaly detection, AI based techniques; physical intrusion in wired and wireless networks...

38
by Gibson, Darril
Published 2012
Microsoft Press
... Management Access Control Cryptography Physical (Environmental) Security Security Architecture and Design...

39
by Ackerman, Pascal
Published 2017
Packt Publishing
Table of Contents: ... Model and a Converged Plantwide Ethernet -- Chapter 6: The Defense-in-depth Model -- Chapter 7: Physical...

40
by Osterhage, Wolfgang
Published 2011
CRC Press
... and Communication SecurityPhysical SecurityDocumentationWireless SecuritySummary...