Search Results - security, (internationa OR integration)

Refine Results
  1. 1
  2. 2

    LAN times guide to security and data integrity by Farley, Marc, Hsu, Jeffrey, Stearns, Tom

    Published 1996
  3. 3
  4. 4

    Sustainable food and agriculture an integrated approach

  5. 5

    Cloud security : a general guide to secured computing by Masnida Hussin, Aziah Asmawi, Normalia Samian

    Published 2021
    Table of Contents: “…Cloud computing overview -- 2. Cloud security overview -- 3. Cloud security threats -- 4. …”
  6. 6

    Towards building an ASEAN community by Rahmat Mohamad, Umminajah Salleh, Ilango Karuppannan

    Published 2004
    Subjects: “…National security Southeast Asia Congresses…”
  7. 7

    Information security for managers by Workman, Michael D. 1957-, Gathegi, John N., Phelps, Daniel C.

    Published 2013
  8. 8

    The best damn firewall book period by Shinder, Thomas W.

    Published 2007
    Table of Contents: “…Authentication -- 7. Content security and OPSEC -- 8. VPN -- 9. Securemote, secureclient, and integrity -- 10. …”
  9. 9
  10. 10

    Introduction to privacy-preserving data publishing : concepts and techniques by Fung, Benjamin C. M.

    Published 2011
  11. 11

    Intrusion detection systems by Di Pietro, Roberto, Mancini, Luigi V.

    Published 2008
    Table of Contents: “…Response : bridging the link between intrusion detection alerts and security policies -- 7. Intrusion detection and reaction : an integrated approach to network security…”
    Publisher description
    Table of contents only
  12. 12

    Information systems strategic management : an integrated approach by Clarke, Steve , 1950-

    Published 2007
    Table of Contents: “…1.Information systems strategic management : an integrated approach -- 2. Lessons from corporate strategy -- 3. …”
  13. 13
  14. 14

    Filemaker pro 9 bible by Cohen, Dennis C., Cologon, Raymond Joseph

    Published 2008
    Table of Contents: “…Beyond the basics -- 4. Integrity and security -- 5. Raising the bar -- 6. …”
    Table of contents only
  15. 15

    Credit risk analysis : a tryst with strategic prudence by Joseph, Ciby , 1969-

    Published 2006
    Table of Contents: “…Pricing methods -- 19. Security basics -- 20. Tangible and intangible security…”
  16. 16

    Management accounting in the digital economy by Bhimani, Alnoor

    Published 2003
    Table of Contents: “…Sedatole -- Technology-driven integration, automation, and standardizaion of business processes: implications for accounting / Chris Chapman and Wai Fong Chua -- Expenditures on competitor analysis and information security: a managerial accounting perspective / Lawrence A. …”
  17. 17

    Cloud enterprise architecture by Raj, Pethuru

    Published 2013
    Table of Contents: “…Cloud security architecture (CSA) -- 11. Cloud governance architecture -- 12. …”
  18. 18

    Singapore and Asia : : impact of the global financial tsunami and other economic issues / by Chia, Wai Mun, Sng, Hui Ying

    Published 2009
    Table of Contents: “…Global economic crisis and energy security: integrated energy market -- 7. Singapore growth model: its strengths and its weaknesses -- 8. …”
  19. 19

    SAP NetWeaver portal technology [ the complete reference by Jay, Rabi

    Published 2008
    McGraw Hill
  20. 20

    Oracle database 11g [ building Oracle XML DB applications by Wang, Jinyu , 1972-

    Published 2011
    McGraw Hill