1
by Karkeraa, Shilpa
Published 2020
Apress
Table of Contents: ... ledgers -- Use Case of Financial Institutions for Letter of Credits -- Chapter 5: Smart Contracts...

2
by McCauley, Alison
Published 2019
O'Reilly Media
Table of Contents: ... Corporate Norm; Everyone Is a Stakeholder; The Focus on Sustainability Is Here to Stay; A Business Case...

3
by St. Jean, Steven, Brady, Damian, Blankenship, Ed, Woodward, Martin
Published 2014
John Wiley & Sons
Table of Contents: ... Compilation, Testing, Packaging, and Deployment; Managing Test Plans; Parallel Development; Adopting Team...

4
by Death, Darren
Published 2017
Packt Publishing
Table of Contents: ... -- Vulnerability management -- The case for vulnerability management -- Summary -- Chapter 3: Preparing...

5
Published 2022
CRC Press
Table of Contents: ... decentralized sharing economy in the tourism industry -- Innovative digital ideas in presenting cultural...

6
by Rajani, Renu
Published 2017
Packt Publishing
Table of Contents: ... (centralized and decentralized) -- Trend towards Hybrid QA teams -- point of view -- What will be the future...

7
by Qian, Yi
Published 2008
Elsevier/Morgan Kaufmann
Table of Contents: ... Control in Distributed Systems -- Digital Identity Management -- 4. Network Survivability / Bjorn Jager...

8
by Lewin, David
Published 2005
Emerald
Table of Contents: ... Jordan, Robert Bruno -- The failure of labor-management cooperation at two Maine paper mills : a case...

9
by Shimonski, Robert.
Published 2009
Syngress Publishing Inc./Elsevier, Inc.
.... It describes network models such as centralized and decentralized, and distinguishes between a local area...

10
by Oram, Andrew
Published 2001
O'Reilly
Table of Contents: ...Authoring is not the same as publishingDecentralization; Abusing port 80; Peer-to-peer...

11
by Howard, Richard
Published 2023
John Wiley & Sons, Incorporated
Table of Contents: ... Future for SBOMs -- Identity Management: A Tactic for Zero Trust -- IAM: IGA and PIM and PAM, Oh My...

12 Table of Contents: ... -- Wireless Protocols -- Wireless Systems Configuration -- Wireless Attacks -- Mobile Device Management...

13
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... -- Tactical level -- IT leadership -- Tactical level -- cyber intelligence program manager -- Operational...

14
Published 2021
CRC Press
Table of Contents: ... Monitoring System with a Practical Use-Case -- 11.1 Introduction -- 11.1.1 Background -- 11.1.2 Problem...

15
by Coen, David
Published 2016
Edward Elgar Pub.
Table of Contents: ... Business, Public Policy, Case-Studies, and Political Theory', World Politics, 16 (4), July, 677-93, 695...

16
by Wu, Chwan-Hwa, Irwin, J. David
Published 2013
CRC Press
Table of Contents: ... Management; Firewalls; Stateless Packet Filtering; Stateful/Session Filtering; Application-Level Gateways...