Search Results - security, ((interactions OR interactive) OR integration)

Refine Results
  1. 1

    Computers, ethics and society by Ermann, M. David, Shauf, Michele S.

    Published 2002
    Subjects: “…Computer security…”
  2. 2

    Social engineering the art of human hacking by Hadnagy, Christopher

    Published 2011
    Subjects:
  3. 3

    LAN times guide to security and data integrity by Farley, Marc, Hsu, Jeffrey, Stearns, Tom

    Published 1996
  4. 4

    Computers in a changing society by Preston, John, Ferrett, Robert, Preston, Sally

    Published 2005
    Table of contents
  5. 5

    Discovering computers complete : your interactive guide to the digital world by Shelly, Gary B., Vermaat, Misty

    Published 2012
  6. 6
  7. 7

    Sustainable food and agriculture an integrated approach

  8. 8

    Cloud security : a general guide to secured computing by Masnida Hussin, Aziah Asmawi, Normalia Samian

    Published 2021
    Table of Contents: “…Cloud computing overview -- 2. Cloud security overview -- 3. Cloud security threats -- 4. …”
  9. 9

    Towards building an ASEAN community by Rahmat Mohamad, Umminajah Salleh, Ilango Karuppannan

    Published 2004
    Subjects: “…National security Southeast Asia Congresses…”
  10. 10

    Information security for managers by Workman, Michael D. 1957-, Gathegi, John N., Phelps, Daniel C.

    Published 2013
  11. 11

    ASEAN's diplomatic and security culture : origins, development and prospects by Haacke, Ju'rgen , 1966-

    Published 2005
    Table of Contents: “…The concept of flexible engagement and the practice of enhanced interaction: intramural challenges to the ?ASEAN way? …”
  12. 12

    The best damn firewall book period by Shinder, Thomas W.

    Published 2007
    Table of Contents: “…Authentication -- 7. Content security and OPSEC -- 8. VPN -- 9. Securemote, secureclient, and integrity -- 10. …”
  13. 13

    Introduction to privacy-preserving data publishing : concepts and techniques by Fung, Benjamin C. M.

    Published 2011
  14. 14

    Intrusion detection systems by Di Pietro, Roberto, Mancini, Luigi V.

    Published 2008
    Table of Contents: “…Response : bridging the link between intrusion detection alerts and security policies -- 7. Intrusion detection and reaction : an integrated approach to network security…”
    Publisher description
    Table of contents only
  15. 15

    Information systems strategic management : an integrated approach by Clarke, Steve , 1950-

    Published 2007
    Table of Contents: “…1.Information systems strategic management : an integrated approach -- 2. Lessons from corporate strategy -- 3. …”
  16. 16

    Contemporary diplomacy : representation and communication in a globalized world by Pigman, Geoffrey Allen

    Published 2010
    Table of Contents: “…Introduction : understanding global interactions through diplomacy -- 2. Section one. Actors and venues. …”
  17. 17

    JD Edwards EnterpriseOne : the complete reference by Jacot, Allen D.

    Published 2009
    Table of Contents: “…Data warehouse and business intelligence -- 6. Interactive and batch applications defined -- 7. Packages and their delivery -- 8. …”
    Table of contents only
  18. 18

    Filemaker pro 9 bible by Cohen, Dennis C., Cologon, Raymond Joseph

    Published 2008
    Table of Contents: “…Beyond the basics -- 4. Integrity and security -- 5. Raising the bar -- 6. …”
    Table of contents only
  19. 19

    Microsoft Windows server 2008 [ the complete reference by Ruest, Danielle, Ruest, Nelson

    Published 2008
    Table of Contents: “…The windows server 2008 delta -- 2. Interact with windows server 2008 -- 3. Plan for windows server 2008 -- 4. …”
    McGraw Hill
  20. 20

    Credit risk analysis : a tryst with strategic prudence by Joseph, Ciby , 1969-

    Published 2006
    Table of Contents: “…Pricing methods -- 19. Security basics -- 20. Tangible and intangible security…”