Search alternatives:
"secularity" » "peculiarity", "regularity", "secularism"

1
Published 2022
Wiley
Table of Contents: ...Front Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath...

2
by Hausman, Kalani Kirk
Published 2003
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

3
by Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents: ...: People are Helpful and Trusting; Chapter 6: Harnessing Human Qualities to Improve Security; Chapter 7...

4
by Sud, Raman
Published 2004
Que Certification
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

5
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

6
by Halleen, Gary
Published 2007
Cisco Press
Table of Contents: ... scenarios -- Ch. 4. Securing CS-MARS -- Ch. 5. Rules, reports, and queries -- Ch. 6. Incident investigation...

7
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

8
by Brunton-Spall, Michael
Published 2015
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

9
by Long, Josh
Published 2019
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10
by Merkow, Mark S.
Published 2014
Pearson Education
Subjects: ...Computer security...

11
by Furnell, Steven
Published 2009
IT Governance Pub.
Subjects: ...Mobile computing / Security measures...

12
by Collins, J. D.
Published 2014
BCS Learning & Development
..."Security architects are responsible for maintaining the security of an organisation's computer...

13
by Kanneganti, Ramarao
Published 2008
Manning
Table of Contents: ...pt. I. SOA Basics -- 1. SOA requires new approaches to security -- 2. Getting started with web...

14
by Knutson, Mick, Winch, Robert, Mularien, Peter
Published 2017
Packt Publishing
Subjects: ...Computer security...

15
by Bellovin, Steven M.
Published 2016
Addison-Wesley
Subjects: ...Computer security...

16
by Oaks, Scott
Published 2001
O'Reilly
Subjects: ...Computer security...

17
by Rice, Liz, Hausenblas, Michael
Published 2018
O'Reilly Media
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

18
by Patterson, Tom
Published 2004
Addison Wesley Professional
Subjects: ...Computer security / Management...

19
by Hayden, Lance
Published 2010
McGraw Hill
Table of Contents: ...1. What is a security metric? -- 2. Designing effective security metrics -- 3. Understanding data...

20
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Table of Contents: .... Responsive security -- 5. Conclusions and implications...