Search alternatives:
development secure » development cure, development secureuml, development security
secure policy » secret policy, security policy, sector policy

1
by Missoni, Eduardo, Alesani, Daniele
Published 2023
Routledge
Table of Contents: ... Policy and governance </P><P>5.5 Funding for development</P><P>5.6 Needs assessment planning...

2
by Fitzgerald, Todd
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security...

3
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ... sophistication of identity attacks; Risk-based access control policy; Identity management across the device...

4
Published 2023
Springer Nature Switzerland
Table of Contents: ...Part 5: Leadership in energy policy: new threats and opportunities -- 23. Digital eco-energy...

5
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...-based Management -- Ways to Corporate Growth -- Diversification and the Achievement of Scope Economies...

6
by Shivakumar, Shailesh Kumar
Published 2015
Morgan Kaufmann, an imprint of Elsevier
Table of Contents: ... principles and policies -- 5.5. Implementing security policy at all levels -- 5.6. Security testing...

7
by Walters, Robert E.
Published 2012
[Apress]
Table of Contents: ... Pane; Managing Multiple Servers; Registered Servers; Queries Against Multiple Servers; Policy-Based...

8
Published 2001
Springer US
Table of Contents: ... Agreement -- Security Policies -- Going Beyond MAC and DAC Using Mobile Policies -- An Access Control Model...

9
by O'Connor, Errin
Published 2011
Microsoft
Table of Contents: ... Framework; Improved Development Experience; WCF Integration; Round-Robin Load Balancing; Claims-Based...

10
by Houben, Aerdt C. F. J.
Published 2008
Edward Elgar
... of defined contribution pension plans / David Blake ; discussion by Solange Berstein -- 7. Risk-based...

11
Published 2018
Springer International Publishing
Table of Contents: ... -- Chapter24. Discovering toxic policies using MBSE constructs -- Chapter25. Model-based Engineering...

12
Published 2022
Springer International Publishing
Table of Contents: ... Smallholders in Developing Economies -- Chapter 13: Policy Interventions for an Agriculture-Based Malaria...

13 Table of Contents: ... from risk management; Stakeholder management; Policies, procedures, and compliance; Governance; EY 7...

14
Published 2023
Springer Nature Singapore
Table of Contents: ..., nonlinear holding cost along with trade credit policy -- Chapter 2: Software Defect Prediction Through a...

15
by Sequeira, Anthony
Published 2024
Packt Publishing
... and created policies in these roles....

16
Published 2015
Springer India
Table of Contents: ...Chapter 1. A Dynamic Conditional Correlation analysis based approach to test Financial Contagion...

17
by Bhajaria, Nishant
Published 2022
Manning Publications
... about privacy. - Diego Casella, InvestSuite Offers some valuable insights and direction for enterprises...

18
Published 2022
Routledge
Table of Contents: ... in the Nordic Countries Able to Secure a Living Wage? Experiences From Low-Wage ... -- Introduction...

19
by Kundan, Ajit Pratap
Published 2019
Packt Publishing
...What you will learn Orchestrate on-demand deployments based on defined policies Automate away...

20
by Wong, Ronnie, Deal, Lauren
Published 2024
Packt Publishing
..., routing protocols, and network security implementations. Through real-world scenarios, you will explore...