1
by Howard, Michael, Gantenbein, Heinrich, Curzi, Simone
Published 2023
Pearson Education
... up against dangerous new threats. That means you must build robust security into your designs, use...

2
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Subjects: ...BUSINESS & ECONOMICS / Corporate Governance / bisacsh...

3
by Moyle, Ed, Kelley, Diana
Published 2022
Packt Publishing
Subjects: ...Computer security / Design and construction...

4
by Kelley, Diana, Moyle, Ed
Published 2023
Packt Publishing Ltd.
Table of Contents: ... of secure design -- Information security policies -- Organization of information security -- Human resources...

5
by Lea, Perry
Published 2018
Packt Publishing
Table of Contents: ... operation; Bluetooth profiles; BR/EDR security; BLE security; Beaconing; Bluetooth 5 range and speed...

6
Published 2015
John Wiley & Sons Inc.
Table of Contents: ... Energy Use Effectiveness; 2.13 Private Industry and Government Energy Efficiency Programs; 2.14 USGBC...

7
by Jackson, Kevin L., Goessling, Scott
Published 2018
Packt Publishing
Table of Contents: ...Table of ContentsPrologueWhat is Cloud Computing?Governance and Change ManagementDesign...

8
by Erl, Thomas
Published 2009
Prentice Hall
Table of Contents: ... Patterns -- Ch. 10. Inventory Governance Patterns -- pt. III. Service Design Patterns -- Ch. 11...

9
by Rosen, Michael
Published 2008
Wiley Pub.
Table of Contents: ... Solutions -- Ch. 10. Designing and Using Integration in SOA Solutions -- Ch. 11. SOA Security -- Ch. 12. SOA...

10
by Smart, Thomas
Published 2023
Apress
Table of Contents: ... -- Better Access Security -- Agility and DevOps Are Easier to Implement -- Easier to Manage Time, Budgets...

11
by O'Connor, Errin
Published 2011
Microsoft
Table of Contents: ... Monitoring and Request Throttling; The Ribbon; Sandboxed Solutions; Security Enhancements; Automatic Password...

12
by Curry, Ben
Published 2008
Microsoft Press
Table of Contents: ... Requirements -- 5. SharePoint Server 2007 and Governance -- 6. Project Plans for a SharePoint Server 2007...

13
by McDonald, Kevin T.
Published 2010
IT Governance Pub.
Table of Contents: .... Taxi runway -- Ch. 4. Tower clearance -- Ch. 5. Securing the cabin -- Ch. 6. Take off -- Ch. 7. Above...

14
Published 2016
O'Reilly Media
..., information architecture, user research, prototyping for connected devices, designing secure experiences...

15
by Jacobs, Naomi, Cooper, Rachel
Published 2018
Routledge
Table of Contents: ... Transactions, payment and ownership -- 6 Challenges of the digital public space: privacy and security -- 7...

16
Published 2015
Newnes, an imprint of Elsevier
Table of Contents: ... and Development; Chapter 12: Security; Chapter 13: Review; Chapter 14: Test and Integration; Chapter 15...

17
by Alla, Sridhar
Published 2018
Packt Publishing
Table of Contents: ... security vulnerabilities -- Reduced operational governance control -- Limited portability between Cloud...

18
Published 2001
Syngress
... to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities...

19
by Baker, Matthew, Beck, Brandon, Chosnek, Doron, McGee, Jason
Published 2022
CISCO PRESS
...Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds...

20
by Esposito, Dino
Published 2018
Microsoft
... the familiar MVC application model in ASP.NET Core Write controller class code to govern all stages of request...