information security applications online kopen

Ben je op zoek naar information security applications? Bekijk onze boeken selectie en zie direct bij welke webshop je information security applications online kan kopen. Ga je voor een ebook of paperback van information security applications. Zoek ook naar accesoires voor information security applications. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je information security applications met korting of in de aanbieding. Alles voor veel leesplezier!

Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA;

Vergelijkbare producten zoals Information Security Applications

Laboratory Manual Version 1.5 To Accompany Security Strategies In Web Applications And Social Networking

Information Systems and Security Series title, Security Strategies in Web Applications and Social Networking. It provides hands-on exercises using the;

Vergelijkbare producten zoals Laboratory Manual Version 1.5 To Accompany Security Strategies In Web Applications And Social Networking

Information Security Applications

This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held;

Vergelijkbare producten zoals Information Security Applications

Computational Intelligence in Information Assurance and Security

information assurance and security using computational intelligence techniques. It details current research on information assurance and security;

Vergelijkbare producten zoals Computational Intelligence in Information Assurance and Security

Information Security Applications

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security;

Vergelijkbare producten zoals Information Security Applications

Security in Smart Cities

introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent;

Vergelijkbare producten zoals Security in Smart Cities

Security in Smart Cities

introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent;

Vergelijkbare producten zoals Security in Smart Cities

Information Security Applications

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security;

Vergelijkbare producten zoals Information Security Applications

Information Security Applications

This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security;

Vergelijkbare producten zoals Information Security Applications

Information Security Applications

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security;

Vergelijkbare producten zoals Information Security Applications

Security with Intelligent Computing and Big data Services

Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security;

Vergelijkbare producten zoals Security with Intelligent Computing and Big data Services

Technician's Guide to Physical Security Networking

This book provides detailed information on the applications, methods, and issues when physical security devices such as IP cameras, access;

Vergelijkbare producten zoals Technician's Guide to Physical Security Networking

Management Of Information Security

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and;

Vergelijkbare producten zoals Management Of Information Security

Cloud Computing and Security

in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications;

Vergelijkbare producten zoals Cloud Computing and Security

Cloud Computing and Security

hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.;

Vergelijkbare producten zoals Cloud Computing and Security

Security Strategies In Web Applications And Social Networking

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Web Applications and;

Vergelijkbare producten zoals Security Strategies In Web Applications And Social Networking

Information and Communication Security

This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011;

Vergelijkbare producten zoals Information and Communication Security

Information Security Education. Education in Proactive Information Security

This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 12, held;

Vergelijkbare producten zoals Information Security Education. Education in Proactive Information Security

Information Security and Cryptology - ICISC 2014

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and;

Vergelijkbare producten zoals Information Security and Cryptology - ICISC 2014

Computer Concepts and Management Information Systems

introduces the major subjects such as hardware components, software applications, detailed information on Microsoft Office, information systems, ERP;

Vergelijkbare producten zoals Computer Concepts and Management Information Systems

E-Security & Software Standards

The generic security requirements needed in the areas of information and network security consist of the following interrelated;

Vergelijkbare producten zoals E-Security & Software Standards

Information and Communications Security

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and;

Vergelijkbare producten zoals Information and Communications Security

Intelligent Data Security Solutions for e-Health Applications

for storing, accessing, and transmitting medical information is outpacing the privacy and security protections on those devices. Researchers;

Vergelijkbare producten zoals Intelligent Data Security Solutions for e-Health Applications

Cloud Computing and Security

Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully;

Vergelijkbare producten zoals Cloud Computing and Security

Cloud Computing and Security

Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were;

Vergelijkbare producten zoals Cloud Computing and Security

Information Security and Cryptology

This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt;

Vergelijkbare producten zoals Information Security and Cryptology

Einde inhoud

Geen pagina's meer om te laden'