Search alternatives:
securite » security, secure

1 Table of Contents: ...-Based Vulnerabilities -- Application-Based Weaknesses -- How E-mail Works -- Security of E-mail -- Mail...

2
by Tiller, James S.
Published 2010
Auerbach Publications
Table of Contents: ... the Author; Chapter 1. Introduction; Chapter 2. Security and Business; Chapter 3. Achieving Adaptability...

3
by Barrett, Diane
Published 2020
Pearson IT Certification
Subjects: ...Computer networks / Security measures / Examinations / fast...

4
by Bradley, Ryan
Published 2015
IBM Redbooks
...Data security is one of the paramount requirements for organizations of all sizes. Although many...

5
by Hampton, Janie
Published 2014
Routledge
Subjects: ...Global governance...

6
by DeJonghe, Derek
Published 2020
O'Reilly Media, Inc.
Table of Contents: ...Additional Tools Available in Azure for Monitoring -- Azure Security Center with NGINX -- Azure...

7
by Dreyfus-Schmidt, Léo
Published 2020
O'Reilly Media, Inc.
Table of Contents: ... and Auditability -- Machine Learning Security -- Adversarial Attacks -- Other Vulnerabilities -- Model Risk...

8
by Kavis, Michael
Published 2020
O'Reilly Media, Inc.
Table of Contents: ... -- Decentralized Model -- Federated Model -- Cloud Platform Roles -- Governance and the Cloud Community of Practice...

9
by Kelley, Diana
Published 2020
Packt Publishing
... of this book, you will have the skills you need to be able to architect solutions with robust security...

10
by McMillian, Robin Abernathy. Troy
Published 2016
Pearson Certification
... governance and risk management Software development security Cryptography Security architecture and design...

11
by Buchanan, Steve
Published 2021
O'Reilly Media, Inc.
... reliability engineers how to manage, secure, and govern Kubernetes clusters with Azure Arc. You'll discover...

12
by Cox, Benjamin
Published 2020
O'Reilly Media, Inc.
... on the technical issues of ML as well as human-centered issues such as security, fairness, and privacy. The goal...