Zoekresultaten - "Computer security Management."

  • Toon 1 - 20 resultaten van 20
Verfijn jouw resultaten
  1. 1

    Secure multi-party computation

    Gepubliceerd in 2013
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  2. 2

    Secure multi-party computation

    Gepubliceerd in 2013
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  3. 3

    A practical guide to managing information security door Purser, Steve

    Gepubliceerd in 2004
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  4. 4

    Information security management principles door Alexander, David

    Gepubliceerd in 2013
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  5. 5

    Information security management principles door Alexander, David

    Gepubliceerd in 2013
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  6. 6

    A practical guide to managing information security door Purser, Steve

    Gepubliceerd in 2004
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  7. 7

    How to cheat at managing information security door Osborne, Mark

    Gepubliceerd in 2006
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  8. 8

    Managing information security

    Gepubliceerd in 2010
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  9. 9

    Managing information security

    Gepubliceerd in 2010
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  10. 10

    How to cheat at managing information security door Osborne, Mark

    Gepubliceerd in 2006
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  11. 11

    Information security for management door Iyengar, Venugopal

    Gepubliceerd in 2010
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  12. 12

    Information security for management door Iyengar, Venugopal

    Gepubliceerd in 2010
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  13. 13

    Syngress IT security project management handbook door Snedaker, Susan

    Gepubliceerd in 2006
    Onderwerpen: “…Computer security Management Handbooks, manuals, etc.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  14. 14

    Information warfare door Ventre, Daniel

    Gepubliceerd in 2009
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  15. 15

    Security architect : careers in information security / door Collins, Jon

    Gepubliceerd in 2014
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  16. 16

    Information warfare door Ventre, Daniel

    Gepubliceerd in 2009
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  17. 17

    Security architect : careers in information security / door Collins, Jon

    Gepubliceerd in 2014
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  18. 18

    Syngress IT security project management handbook door Snedaker, Susan

    Gepubliceerd in 2006
    Onderwerpen: “…Computer security Management Handbooks, manuals, etc.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  19. 19

    Information warfare / door Ventre, Daniel

    Gepubliceerd in 2016
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek
  20. 20

    Information warfare / door Ventre, Daniel

    Gepubliceerd in 2016
    Onderwerpen: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-boek