1
by Zinatullin, Leron
Published 2018
IT Governance Publishing
...The Psychology of Information Security - Resolving conflicts between security compliance and human...

2
by Watkins, Steve
Published 2018
IT Governance Publishing
...The ideal primer for anyone implementing an information security management system. Written...

3
by Malisow, Ben
Published 2021
Ascent Audio
...The only official study guide for the new CCSP exam (ISC)2 CCSP Certified Cloud Security...

4
by Hines, Baxter
Published 2021
Ascent Audio
Subjects: ...Financial services industry / Security measures...

5
by Kohnke, Anne, Shoemaker, Dan, Sigler, Kenneth
Published 2016
Auerbach Publications
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

6
by Kooijmans, Alex
Published 2007
IBM Redbooks, Safari
... of some of the most important security scenarios available with WebSphere® Application Server Version 6.1...

8
by Baldwin, David
Published 2002
Center for Creative Leadership, Safari
... need to secure resources, to look after themselves in regard to their career development, to find out...

9
by Birla, Madan
Published 2005
John Wiley & Sons
Table of Contents: ... in the enterprise -- Expect and help employees to continually grow -- Create a secure environment for expression...

10
by Medvec, Victoria
Published 2021
Ascent Audio
... negotiated with an Issue Matrix to ensure you have the right issues to secure what you want; establish...

11
by Nymand, Christian, Kvedare, Mante
Published 2021
Ascent Audio
... engagement model is the new normal. To secure existing and future revenue streams in the virtual B2B sales...

12
by MacDonald, Matthew
Published 2010
Apress
Table of Contents: ... -- Website Security -- Security Fundamentals -- Membership -- Profiles -- Advanved ASP.NET -- Component-Based...

13
by MacDonald, Matthew
Published 2007
Apress
Table of Contents: ... -- pt. 4. Working with data -- pt. 5. Website security -- pt. 6. Advanced ASP.NET....

14
by MacDonald, Matthew
Published 2010
Apress
Table of Contents: ... forms -- pt. 4. Working with data -- pt. 5. Website security -- pt. 6. Advanced ASP .NET....

15
by Reid, Fiach
Published 2004
Elsevier/Digital Press
Table of Contents: ... -- FTP : communicating with file servers -- Securing a network : firewalls, proxy servers, and routers...

16
by Zehoo, Edmund
Published 2010
Apress
Table of Contents: ... -- Using Oracle Database Streams Advanced Queuing with ODP.NET -- Oracle XML Support -- ODP.NET Security...

17
by Oliviero, Andrew
Published 2009
Wiley Pub.
Table of Contents: ...; Cabling Management; Data and Cabling Security; Cabling Installation Procedures; The Bottom Line; Chapter...

18
by Kenyon, Bridget
Published 2020
IT Governance Publishing
...Ideal for information security managers, auditors, consultants and organisations preparing for ISO...

19
by Buecker, Axel
Published 2002
IBM Redbooks, Safari
... contemporary e-business solutions. Access Manager is the key element in an e-business security framework...

20
by Waddington, William
Published 2021
O'Reilly Media, Inc, Safari
... massive datasets across use cases such as customer 360, application health and security analytics, the IoT...