1
by Klett, Gerhard, Kersten, Heinrich
Published 2015
mitp
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

2
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens -- Data...

3
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

4
by Shirono, Kazuko
Published 2021
International Monetary Fund
Subjects: ...Mobile banking...

5
by Bravo, Cesar, Toska, Desilda
Published 2023
Packt Publishing
Table of Contents: ... for defensive security -- Summary -- Further reading...

6
by Kudrati, Abbas, Pillai, Binil
Published 2023
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

7
by Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Assessments 129 -- Cloud Security Alliance 130 -- Vendor Security Alliance 130 -- Sharing Data with Your...

8
by Swan, Melanie
Published 2015
O'Reilly
Subjects: ...Electronic funds transfers / Security measures / fast...

9
Published 2019
OECD Publishing
Table of Contents: ... -- Reader's Guide -- E-consumer trust -- User sophistication -- Roadmap: Measuring cloud computing services...

10
by Lukonga, Inutu
Published 2018
International Monetary Fund
Subjects: ...Computer security...

11
by Anderson, Kym
Published 2014
Edward Elgar Pub. Ltd

12
by Heisterberg, Rodney J.
Published 2014
John Wiley & Sons, Inc.
Table of Contents: ...Paradigm Shifts: Mainframes to Client-Server to Cloud ComputingNext Evolution: Large Data Center...

13
Published 2022
International Monetary Fund
Subjects: ...Computer security...

14
by Lin, Zihuai
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...hardware security...

15
by Deckler, Greg, Powell, Brett
Published 2022
Packt Publishing Ltd.
Table of Contents: ... and Transforming Data with M Designing Import, DirectQuery, and Composite Data Models Developing DAX Measures...

16
by Murray, Daniel G.
Published 2013
J. Wiley & Sons
Table of Contents: ... Consumption -- Security Considerations for Mobile Consumption -- Typical Mobile Usage Patterns -- Using...

17
Published 2022
Microsoft Press
Subjects: ...Microsoft Power BI (Computer file) / fast...

18
Published 1994
International Monetary Fund
Subjects: ...National Security and War...

19
Published 1995
International Monetary Fund
Subjects: ...Social Security and Public Pensions...

20
by Mahler, Martin, Vitantonio, Juan Ignacio
Published 2018
Packt Publishing
Table of Contents: ...Basic rule editor -- Validating the security rule condition -- Auditing security rules -- Working...