Search Results - security, (interactions OR integration)
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 5
- Computer security 5
- Business enterprises 4
- Security measures 4
- Human-computer interaction 3
- Management 3
- National security 3
- Cloud computing 2
- Computer science 2
- Computers and civilization 2
- Data processing 2
- Data protection 2
- Database management 2
- Economic policy 2
- Information technology 2
- Management information systems 2
- Asia 1
- Business 1
- Case studies 1
- Commercial credit 1
- Computer hackers 1
- Computer programs 1
- Computers 1
- Confidential communications 1
- Congresses 1
- Credit 1
- Database security 1
- Defences 1
- Diplomacy 1
- Economic integration 1
Search alternatives:
- interactions »
-
1
-
2
-
3
-
4
-
5
Cloud security : a general guide to secured computing
Published 2021Table of Contents: “…Cloud computing overview -- 2. Cloud security overview -- 3. Cloud security threats -- 4. …”
-
6
-
7
Towards building an ASEAN community
Published 2004Subjects: “…National security Southeast Asia Congresses…”
-
8
-
9
ASEAN's diplomatic and security culture : origins, development and prospects
Published 2005Table of Contents: “…ASEAN?s diplomatic and security culture after the Hanoi Summit: has ?old? …”
-
10
The best damn firewall book period
Published 2007Table of Contents: “…Authentication -- 7. Content security and OPSEC -- 8. VPN -- 9. Securemote, secureclient, and integrity -- 10. …”
-
11
-
12
-
13
Intrusion detection systems
Published 2008Table of Contents: “…Response : bridging the link between intrusion detection alerts and security policies -- 7. Intrusion detection and reaction : an integrated approach to network security…”
Publisher description
Table of contents only
-
14
Information systems strategic management : an integrated approach
Published 2007Table of Contents: “…1.Information systems strategic management : an integrated approach -- 2. Lessons from corporate strategy -- 3. …”
-
15
-
16
Filemaker pro 9 bible
Published 2008Table of Contents: “…Beyond the basics -- 4. Integrity and security -- 5. Raising the bar -- 6. …”
Table of contents only
-
17
Credit risk analysis : a tryst with strategic prudence
Published 2006Table of Contents: “…Pricing methods -- 19. Security basics -- 20. Tangible and intangible security…”
-
18
Management accounting in the digital economy
Published 2003Table of Contents: “…Sedatole -- Technology-driven integration, automation, and standardizaion of business processes: implications for accounting / Chris Chapman and Wai Fong Chua -- Expenditures on competitor analysis and information security: a managerial accounting perspective / Lawrence A. …”
-
19
Cloud enterprise architecture
Published 2013Table of Contents: “…Cloud security architecture (CSA) -- 11. Cloud governance architecture -- 12. …”
-
20
Contemporary diplomacy : representation and communication in a globalized world
Published 2010Table of Contents: “…Introduction : understanding global interactions through diplomacy -- 2. Section one. Actors and venues. …”