Search Results - security, integration

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    LAN times guide to security and data integrity by Farley, Marc, Hsu, Jeffrey, Stearns, Tom

    Published 1996
  2. 2
  3. 3

    Sustainable food and agriculture an integrated approach

  4. 4

    Cloud security : a general guide to secured computing by Masnida Hussin, Aziah Asmawi, Normalia Samian

    Published 2021
    Table of Contents: “…Cloud computing overview -- 2. Cloud security overview -- 3. Cloud security threats -- 4. …”
  5. 5

    Towards building an ASEAN community by Rahmat Mohamad, Umminajah Salleh, Ilango Karuppannan

    Published 2004
    Subjects: “…National security Southeast Asia Congresses…”
  6. 6

    Information security for managers by Workman, Michael D. 1957-, Gathegi, John N., Phelps, Daniel C.

    Published 2013
  7. 7

    The best damn firewall book period by Shinder, Thomas W.

    Published 2007
    Table of Contents: “…Authentication -- 7. Content security and OPSEC -- 8. VPN -- 9. Securemote, secureclient, and integrity -- 10. …”
  8. 8

    Introduction to privacy-preserving data publishing : concepts and techniques by Fung, Benjamin C. M.

    Published 2011
  9. 9

    Intrusion detection systems by Di Pietro, Roberto, Mancini, Luigi V.

    Published 2008
    Table of Contents: “…Response : bridging the link between intrusion detection alerts and security policies -- 7. Intrusion detection and reaction : an integrated approach to network security…”
    Publisher description
    Table of contents only
  10. 10

    Information systems strategic management : an integrated approach by Clarke, Steve , 1950-

    Published 2007
    Table of Contents: “…1.Information systems strategic management : an integrated approach -- 2. Lessons from corporate strategy -- 3. …”
  11. 11

    Filemaker pro 9 bible by Cohen, Dennis C., Cologon, Raymond Joseph

    Published 2008
    Table of Contents: “…Beyond the basics -- 4. Integrity and security -- 5. Raising the bar -- 6. …”
    Table of contents only
  12. 12

    Credit risk analysis : a tryst with strategic prudence by Joseph, Ciby , 1969-

    Published 2006
    Table of Contents: “…Pricing methods -- 19. Security basics -- 20. Tangible and intangible security…”
  13. 13

    Management accounting in the digital economy by Bhimani, Alnoor

    Published 2003
    Table of Contents: “…Sedatole -- Technology-driven integration, automation, and standardizaion of business processes: implications for accounting / Chris Chapman and Wai Fong Chua -- Expenditures on competitor analysis and information security: a managerial accounting perspective / Lawrence A. …”
  14. 14

    Cloud enterprise architecture by Raj, Pethuru

    Published 2013
    Table of Contents: “…Cloud security architecture (CSA) -- 11. Cloud governance architecture -- 12. …”
  15. 15

    Singapore and Asia : : impact of the global financial tsunami and other economic issues / by Chia, Wai Mun, Sng, Hui Ying

    Published 2009
    Table of Contents: “…Global economic crisis and energy security: integrated energy market -- 7. Singapore growth model: its strengths and its weaknesses -- 8. …”
  16. 16

    SAP NetWeaver portal technology [ the complete reference by Jay, Rabi

    Published 2008
    McGraw Hill
  17. 17

    Oracle database 11g [ building Oracle XML DB applications by Wang, Jinyu , 1972-

    Published 2011
    McGraw Hill
  18. 18

    Wireless home networking for dummies by Briere, Daniel D., Hurley, Patrick J. , 1942-

    Published 2011