1
by Scholz, James A.
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: .... Infrastructure security model components -- chapter 4. Systems security categorization -- chapter 5. Business...

2
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Subjects: ...security systems / aat...

3
by Garverick, Josh
Published 2018
Apress
Table of Contents: ...Data SecurityApplication Security; Identity and Access Management; Transport and Delivery Channels...

4
by Oppenheimer, Priscilla
Published 2004
Cisco Press
..., secure, and manageable. Using illustrations and real-world examples, it teaches a systematic method...

5
by Belew, Shannon
Published 2012
Wiley
Table of Contents: ... -- Internet security -- Boosting sales -- Retail to e-tail -- Storefront selling -- Fundraising sites -- Niche...

6
by Rozema, Michiel
Published 2022
Pact Publishing
Table of Contents: ... Security with DAX Dynamically Changing Visualizations Alternative Calendars Working with AutoExist...

7
by McDonald, Kevin T.
Published 2010
IT Governance Pub.
Table of Contents: .... Taxi runway -- Ch. 4. Tower clearance -- Ch. 5. Securing the cabin -- Ch. 6. Take off -- Ch. 7. Above...

8
by Henry, Jerome, Barton, Robert, Hucaby, Dave
Published 2020
Cisco Press
Table of Contents: ...Evaluating Security Requirements -- AP Deployment Models -- Data Deployment Model -- Voice/Video...

9
by Da Silva, Maxwell Dayvson, Tavares, Hugo Lopes
Published 2015
Packt Publishing
Table of Contents: ... the memory properly; An inappropriate persistence strategy; Summary; Chapter 7: Security Techniques (Guard...

10
by Nadipalli, Rajesh
Published 2017
Packt Publishing
..., and analysis Secure your data used for QuickSight from S3, RedShift, and RDS instances Manage users, access...

11
by Edenfield, Orrin
Published 2022
Packt Publishing, Limited
..., prepare it for consumption by business users, and maintain an enterprise environment in a secure...

12
by Prusinski, Ben
Published 2012
McGraw
..., establish workflow, manage invoices and inventory, create budgets and forecasts, and secure your corporate...

13
by Gerald, Bastin
Published 2002
McGraw-Hill/Osborne
Table of Contents: ...Corporate Structure -- Security Group -- Business Group (BG) -- Set of Books -- Legal Entity...

14
by Knight, Devin, Knight, Brian, Pearson, Mitchell, Quintana, Manuel
Published 2018
Packt Publishing
Table of Contents: ...; Sharing your dashboards; Workspaces; Setting up row-level security...

15
by Paetz, Paul
Published 2014
Apress
Table of Contents: ... -- What Is Different About Managing to Secure the Future? -- Summary -- Key Takeaways -- Index -- Other...

16
by Gordon, Keith
Published 2022
BCS, The Chartered Institute for IT
Table of Contents: .... DATA ACCESSIBILITY -- Data security -- Data integrity -- Data recovery -- Summary -- 9. MASTER DATA...

17
by Clevenger, Nathan C.
Published 2011
Wiley
..., system integration, information security, application deployment, and device management...

18
by Contreras, J-P, Sigman, Betsy Page, Delgado, Erickson
Published 2018
Packt Publishing
... Understand security and deployment considerations for taking Splunk to an organizational level Who this book...