Search Results - security, ((interactions OR interactive) OR integration)
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 5
- Computer security 5
- Business enterprises 4
- Security measures 4
- Human-computer interaction 3
- Management 3
- National security 3
- Cloud computing 2
- Computer science 2
- Computers and civilization 2
- Data processing 2
- Data protection 2
- Database management 2
- Economic policy 2
- Information technology 2
- Management information systems 2
- Asia 1
- Business 1
- Case studies 1
- Commercial credit 1
- Computer hackers 1
- Computer programs 1
- Computers 1
- Confidential communications 1
- Congresses 1
- Credit 1
- Database security 1
- Defences 1
- Diplomacy 1
- Economic integration 1
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
Cloud security : a general guide to secured computing
Published 2021Table of Contents: “…Cloud computing overview -- 2. Cloud security overview -- 3. Cloud security threats -- 4. …”
-
9
Towards building an ASEAN community
Published 2004Subjects: “…National security Southeast Asia Congresses…”
-
10
-
11
ASEAN's diplomatic and security culture : origins, development and prospects
Published 2005Table of Contents: “…The concept of flexible engagement and the practice of enhanced interaction: intramural challenges to the ?ASEAN way? …”
-
12
The best damn firewall book period
Published 2007Table of Contents: “…Authentication -- 7. Content security and OPSEC -- 8. VPN -- 9. Securemote, secureclient, and integrity -- 10. …”
-
13
-
14
Intrusion detection systems
Published 2008Table of Contents: “…Response : bridging the link between intrusion detection alerts and security policies -- 7. Intrusion detection and reaction : an integrated approach to network security…”
Publisher description
Table of contents only
-
15
Information systems strategic management : an integrated approach
Published 2007Table of Contents: “…1.Information systems strategic management : an integrated approach -- 2. Lessons from corporate strategy -- 3. …”
-
16
Contemporary diplomacy : representation and communication in a globalized world
Published 2010Table of Contents: “…Introduction : understanding global interactions through diplomacy -- 2. Section one. Actors and venues. …”
-
17
JD Edwards EnterpriseOne : the complete reference
Published 2009Table of Contents: “…Data warehouse and business intelligence -- 6. Interactive and batch applications defined -- 7. Packages and their delivery -- 8. …”
Table of contents only
-
18
Filemaker pro 9 bible
Published 2008Table of Contents: “…Beyond the basics -- 4. Integrity and security -- 5. Raising the bar -- 6. …”
Table of contents only
-
19
Microsoft Windows server 2008 [ the complete reference
Published 2008Table of Contents: “…The windows server 2008 delta -- 2. Interact with windows server 2008 -- 3. Plan for windows server 2008 -- 4. …”
McGraw Hill
-
20
Credit risk analysis : a tryst with strategic prudence
Published 2006Table of Contents: “…Pricing methods -- 19. Security basics -- 20. Tangible and intangible security…”