Ngā hua rapu - "Computer security Management."
-
1
Secure multi-party computation
I whakaputaina 2013Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
2
A practical guide to managing information security
I whakaputaina 2004Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
3
Information security management principles
I whakaputaina 2013Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
4
How to cheat at managing information security
I whakaputaina 2006Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
5
Managing information security
I whakaputaina 2010Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
6
Information security for management
I whakaputaina 2010Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
7
Syngress IT security project management handbook
I whakaputaina 2006Ngā marau: “…Computer security Management Handbooks, manuals, etc.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
8
Information warfare
I whakaputaina 2009Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
9
Security architect : careers in information security /
I whakaputaina 2014Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
10
Information warfare /
I whakaputaina 2016Ngā marau: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka