Search alternatives:
"physician" » "physicians"

61
by Russinovich, Mark E.
Published 2009
Microsoft Press
Table of Contents: ... -- Page List Dynamics -- Page Priority -- Modified Page Writer -- PFN Data Structures -- Physical Memory...

62
by DeFranco, Joanna F.
Published 2014
CRC Press
... cyber-physical systems such as the smart electric grid, smart transportation, and advanced manufacturing...

63
by Calder, Alan
Published 2023
IT Governance Ltd
Table of Contents: ... security -- Chapter 21: Physical and environmental security -- Chapter 22: Security monitoring -- Chapter...

64
by Gregg, Michael
Published 2012
Pearson IT Certification
... exam! · Enforce effective physical security throughout your organization · Apply reliable...

65
by Pepelnjak, Ivan
Published 2006
Cisco Press
... of firewall policies on network traffic. This functionality allows the grouping of physical and virtual...

66
by Clarke, Glen E.
Published 2022
McGraw-Hill
... " Cryptography " Managing a Public Key Infrastructure " Physical Security " Application Attacks and Security...

67
Published 2023
Expanding Security

68
by Fisher, Derek
Published 2023
Packt Publishing Ltd.
... protection. You will learn security in architecture, networking, and physical locations. Lastly, you will see...

69
by Clark, Champ
Published 2008
Syngress Pub.
... an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical...

70
by Xu, Jack
Published 2009
Apress
... wide applications in representing mathematical, physical, and economic functions in your daily life...

71
by Lachance, Daniel, Clarke, Glen E.
Published 2017
McGraw-Hill Education
... • Managing a Public Key Infrastructure • Physical Security • Risk Analysis • Disaster Recovery and Business...

72
by Both, David P.
Published 2023
Apress
...In Using and Administering Linux: Volume 3 you'll work with multiple VMs on a single physical host...

73
by Abernathy, Robin M., McMillian, Troy
Published 2016
Pearson IT Certification
..., and compliance Physical (environmental) security...

74
by Meyler, Kerrie
Published 2009
Sams Pub.
... to assess, deploy, and update servers, clients, and devices across physical, virtual, distributed...

75
by Rahabok, Iwan
Published 2016
Packt Publishing
Table of Contents: ...; Not all virtualizations are equal; Virtual Machine -- it is not what you think!; Physical server versus...

76
by Gregg, Michael
Published 2006
Syngress Pub.
Table of Contents: ...1 Extending OSI to Network Security (20 pp) 2 -- Layer 1 Physical layer (30 pp) Introduction...

78
Published 2022
CRC Press
Table of Contents: .... 37. Protecting Virtual Infrastructure. 38. SDN and NFV Security. 39. Cyber-Physical Systems Security...

79
by Velu, Vijay Kumar
Published 2017
Packt Publishing
... will also be examined, including bypassing physical security and exfiltration of data using different...

80
by Henry, Kevin M.
Published 2012
IT Governance Pub.
Table of Contents: ...; The start of the test; Physical information gathering; Other data sources; Avoiding footprinting; Key...