Search alternatives:
user » used, uber

1
by Brown, Iain L. J.
Published 2014
SAS Institute
Subjects: ...SAS (Computer file) / http://id.loc.gov/authorities/names/n88028236...

2
by Brumfield, Cynthia, Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ...A. Restrict the Use of Certain Types of Media On Your Systems 46 -- B. Wherever Possible, Limit...

3
by Blum, Dan
Published 2020
Apress
Subjects: ...Computer security...

4
Published 2020
SAS Institute
Table of Contents: ... Are the Prerequisites for This Book? -- What Should You Know about the Examples? -- Software Used to Develop the Book...

5
by Johnson, Leighton
Published 2016
Syngress is an imprint of Elsevier
Table of Contents: ... Official Designated Representative; Information Owner/Steward; Risk Executive (Function); User...

6
by Malz, Allan M.
Published 2011
Wiley
Table of Contents: ...Further ReadingCHAPTER 3 Value-at-Risk; 3.1 Definition of Value-at-Risk; 3.1.1 The User-Defined...