1
by Mirabito, Michael M.
Published 2004
Focal Press

2
by Akhgar, Babak
Published 2013
Butterworth-Heinemann
Table of Contents: ... management nexus -- A semantic approach to security policy reasoning -- The Athena project : using formal...

3
by Cross, Michael
Published 2014
Syngress
Table of Contents: ... -- 7. The dark side -- 8. Risk management -- 9. Policies and privacy -- 10. Security -- 11. Where do we...

4
by Charantimath, Poornima M.
Published 2005
Pearson
Table of Contents: ... and Machinery; Government Policy and Development of the Small-scale Sector in India; Industrial Policy 1991...

5
by Grant, August E., Meadows, Jennifer Harman
Published 2018
Routledge
Table of Contents: ... Industries -- chapter 5 Communication Policy and Technology -- part II Electronic Mass Media -- chapter 6...

6
by Edge, Charles S.
Published 2010
Apress
... solid device setup, security, and adherence to organization policies. Finally, you'll learn how to use...

7
Published 2015
John Wiley & Sons Ltd
Table of Contents: ... Information Repository; 2.6.2 Service Admission Control Policies; 2.6.3 Network Resource Provisioning; 2.6.4...

8
by Borgman, Christine L.
Published 2018
Findaway World
... of her findings for scholarly practice and research policy. To manage and exploit data over the long term...

9
by Abelson, Harold
Published 2008
Addison-Wesley