類似資料: IT compliance and controls
- Unauthorised access physical penetration testing for IT security teams /
- Implementing SSL/TLS using cryptography and PKI /
- Virtual private networking a construction, operation and utilization guide /
- Secure computer and network systems modeling, analysis and design /
- Security patterns in practice : designing secure architectures using software patterns /
- Mobile access safety beyond BYOD /
トピック: Computer networks
- Cyber security and resiliency policy framework /
- Risk propagation assessment for network security application to airport communication network design /
- Encase computer forensics : the official ENCE : Encase certified examiner study guide /
- High performance heterogeneous computing
- VANETs : vehicular applications and inter-networking technologies /
- Media and the city : urbanism, technology and communication /
トピック: Information technology
- M&A information technology best practices /
- New media and politics /
- The CIO playbook : strategies and best practices for IT leaders to deliver value /
- Managing knowledge : perspectives on cooperation and competition /
- Lessons in IT transformation : technology expert to business leader /
- Implementing and managing eGovernment : an international text /