1
by Zinatullin, Leron
Published 2018
IT Governance Publishing
...The Psychology of Information Security - Resolving conflicts between security compliance and human...

2
by Watkins, Steve
Published 2018
IT Governance Publishing
...The ideal primer for anyone implementing an information security management system. Written...

3
by Hines, Baxter
Published 2021
Ascent Audio
Subjects: ...Financial services industry / Security measures...

4
by Malisow, Ben
Published 2021
Ascent Audio
...The only official study guide for the new CCSP exam (ISC)2 CCSP Certified Cloud Security...

5
by Kohnke, Anne, Shoemaker, Dan, Sigler, Kenneth
Published 2016
Auerbach Publications
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

6
by Kooijmans, Alex
Published 2007
IBM Redbooks, Safari
... of some of the most important security scenarios available with WebSphere® Application Server Version 6.1...

8
by Buecker, Axel
Published 2002
IBM Redbooks, Safari
... contemporary e-business solutions. Access Manager is the key element in an e-business security framework...

9
by Kenyon, Bridget
Published 2020
IT Governance Publishing
...Ideal for information security managers, auditors, consultants and organisations preparing for ISO...

10
by MacDonald, Matthew
Published 2010
Apress
Table of Contents: ... -- Website Security -- Security Fundamentals -- Membership -- Profiles -- Advanved ASP.NET -- Component-Based...

11
by MacDonald, Matthew
Published 2007
Apress
Table of Contents: ... -- pt. 4. Working with data -- pt. 5. Website security -- pt. 6. Advanced ASP.NET....

12
by Waddington, William
Published 2021
O'Reilly Media, Inc, Safari
... massive datasets across use cases such as customer 360, application health and security analytics, the IoT...

13
by MacDonald, Matthew
Published 2010
Apress
Table of Contents: ... forms -- pt. 4. Working with data -- pt. 5. Website security -- pt. 6. Advanced ASP .NET....

14
by Systems, Adobe
Published 2008
Adobe Systems, Safari
..., and Flash Player security...

15
by Calder, Alan
Published 2018
IT Governance Publishing
...Information security means much more than a technology solution, and requires buy-in from senior...

16
by Birla, Madan
Published 2005
John Wiley & Sons
Table of Contents: ... in the enterprise -- Expect and help employees to continually grow -- Create a secure environment for expression...

17
by Schultheis, Bill
Published 2021
Ascent Audio
... essential components to long-term financial security: saving, investing, and planning. Each component...

18
by Reid, Fiach
Published 2004
Elsevier/Digital Press
Table of Contents: ... -- FTP : communicating with file servers -- Securing a network : firewalls, proxy servers, and routers...

19
by Mohorea, Constantin
Published 2021
Cisco Press, Safari
... Deployment and Security Infrastructure and Automation This digital Study Guide provides Detailed review...

20
by Steyer, Manfred
Published 2021
dpunkt, Safari
... komplexe Geschäftsanwendungen wichtig sind: moderne Security-Szenarien, Internationalisierung, Performance...