Search Results - security, (interactions OR integration)

Search alternatives:

Refine Results
  1. 1

    LAN times guide to security and data integrity by Farley, Marc, Hsu, Jeffrey, Stearns, Tom

    Published 1996
  2. 2
  3. 3

    Computers, ethics and society by Ermann, M. David, Shauf, Michele S.

    Published 2002
    Subjects: “…Computer security…”
  4. 4

    Sustainable food and agriculture an integrated approach

  5. 5

    Cloud security : a general guide to secured computing by Masnida Hussin, Aziah Asmawi, Normalia Samian

    Published 2021
    Table of Contents: “…Cloud computing overview -- 2. Cloud security overview -- 3. Cloud security threats -- 4. …”
  6. 6

    Social engineering the art of human hacking by Hadnagy, Christopher

    Published 2011
    Subjects:
  7. 7

    Towards building an ASEAN community by Rahmat Mohamad, Umminajah Salleh, Ilango Karuppannan

    Published 2004
    Subjects: “…National security Southeast Asia Congresses…”
  8. 8

    Information security for managers by Workman, Michael D. 1957-, Gathegi, John N., Phelps, Daniel C.

    Published 2013
  9. 9

    ASEAN's diplomatic and security culture : origins, development and prospects by Haacke, Ju'rgen , 1966-

    Published 2005
    Table of Contents: “…ASEAN?s diplomatic and security culture after the Hanoi Summit: has ?old? …”
  10. 10

    The best damn firewall book period by Shinder, Thomas W.

    Published 2007
    Table of Contents: “…Authentication -- 7. Content security and OPSEC -- 8. VPN -- 9. Securemote, secureclient, and integrity -- 10. …”
  11. 11

    Introduction to privacy-preserving data publishing : concepts and techniques by Fung, Benjamin C. M.

    Published 2011
  12. 12

    Computers in a changing society by Preston, John, Ferrett, Robert, Preston, Sally

    Published 2005
    Table of contents
  13. 13

    Intrusion detection systems by Di Pietro, Roberto, Mancini, Luigi V.

    Published 2008
    Table of Contents: “…Response : bridging the link between intrusion detection alerts and security policies -- 7. Intrusion detection and reaction : an integrated approach to network security…”
    Publisher description
    Table of contents only
  14. 14

    Information systems strategic management : an integrated approach by Clarke, Steve , 1950-

    Published 2007
    Table of Contents: “…1.Information systems strategic management : an integrated approach -- 2. Lessons from corporate strategy -- 3. …”
  15. 15

    Discovering computers complete : your interactive guide to the digital world by Shelly, Gary B., Vermaat, Misty

    Published 2012
  16. 16

    Filemaker pro 9 bible by Cohen, Dennis C., Cologon, Raymond Joseph

    Published 2008
    Table of Contents: “…Beyond the basics -- 4. Integrity and security -- 5. Raising the bar -- 6. …”
    Table of contents only
  17. 17

    Credit risk analysis : a tryst with strategic prudence by Joseph, Ciby , 1969-

    Published 2006
    Table of Contents: “…Pricing methods -- 19. Security basics -- 20. Tangible and intangible security…”
  18. 18

    Management accounting in the digital economy by Bhimani, Alnoor

    Published 2003
    Table of Contents: “…Sedatole -- Technology-driven integration, automation, and standardizaion of business processes: implications for accounting / Chris Chapman and Wai Fong Chua -- Expenditures on competitor analysis and information security: a managerial accounting perspective / Lawrence A. …”
  19. 19

    Cloud enterprise architecture by Raj, Pethuru

    Published 2013
    Table of Contents: “…Cloud security architecture (CSA) -- 11. Cloud governance architecture -- 12. …”
  20. 20

    Contemporary diplomacy : representation and communication in a globalized world by Pigman, Geoffrey Allen

    Published 2010
    Table of Contents: “…Introduction : understanding global interactions through diplomacy -- 2. Section one. Actors and venues. …”