Ben je op zoek naar i information security? Bekijk onze boeken selectie en zie direct bij welke webshop je i information security online kan kopen. Ga je voor een ebook of paperback van i information security. Zoek ook naar accesoires voor i information security. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je i information security met korting of in de aanbieding. Alles voor veel leesplezier!
This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and;
Vergelijkbare producten zoals Information and Communications Security
The security classification regime in use within the federal executive branch traces its origins to armed forces information protection;
Vergelijkbare producten zoals Classified Information
AWARENESS: APPLYING PRACTICAL SECURITY IN YOUR WORLD, 4E, International Edition continues to present the same straightforward, practical information;
Vergelijkbare producten zoals Security Awareness
I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It;
Vergelijkbare producten zoals Information Security and Cryptology - ICISC 2000
internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing.;
Vergelijkbare producten zoals Artificial Intelligence and Security
internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing.;
Vergelijkbare producten zoals Artificial Intelligence and Security
information security risks. Cloud computing can both increase and decrease the security of information systems in federal agencies. Potential;
Vergelijkbare producten zoals Cloud Computing & Government
Previous information security references do not address the gulf between general security awareness and the specific technical steps that;
Vergelijkbare producten zoals Surviving Security
Previous information security references do not address the gulf between general security awareness and the specific technical steps that;
Vergelijkbare producten zoals Surviving Security
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security;
Vergelijkbare producten zoals Information Security and Privacy
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security;
Vergelijkbare producten zoals Information Security and Privacy
: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and;
Vergelijkbare producten zoals Advances in Artificial Intelligence and Security
Bridging the gap between information security and strategic planning This publication is a reflection of the author's firsthand experience;
Vergelijkbare producten zoals Information Security
Implement information security effectively as per your organization's needs. About This Book * Learn to build your own information;
Vergelijkbare producten zoals Information Security Handbook
. - Denise Wood, CVP & Chief Information Security Officer, FedEx Corporation Having worked with this team for years, I believe that sharing their;
Vergelijkbare producten zoals Security Battleground
exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection;
Vergelijkbare producten zoals Physical-Layer Security and Quantum Key Distribution
exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection;
Vergelijkbare producten zoals Physical-Layer Security and Quantum Key Distribution
Security of Information and Networks includes invited and contributed papers on information assurance, security, and public policy. It;
Vergelijkbare producten zoals Security of Information and Networks
available when it is needed. The EXIN Information Security Management (based on ISO/IEC 27001) certification program consist out of three Modules;
Vergelijkbare producten zoals Information Security Management Professional Based on Iso/Iec 27001 Courseware
Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while;
Vergelijkbare producten zoals Threats, Countermeasures, and Advances in Applied Information Security
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more;
Vergelijkbare producten zoals Information Security Governance
In this long-awaited update to IBM i Security Administration and Compliance, security expert Carol Woodbury tells you everything you need;
Vergelijkbare producten zoals IBM I Security Administration and Compliance
to: applying written information in a safety and security setting; following directions (maps); retaining and comprehending spoken;
Vergelijkbare producten zoals Campus Public Safety Officer I (C-881)
Information Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the;
Vergelijkbare producten zoals Information Security in Healthcare
Assessing Information Security deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security;
Vergelijkbare producten zoals Assessing Information Security Strategies, Tactics, Logic and Framework
I designed this book to be a survey of basic building blocks of Information Systems, and I based it on entry-level college courses that I;
Vergelijkbare producten zoals Information Technology Essentials Volume 1
Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's;
Vergelijkbare producten zoals Sensitive Security Information, Certified (R) (SSI) Body of Knowledge
Einde inhoud
Geen pagina's meer om te laden'