-
121by John ViegaSubjects: “...Cuts to the heart of computer security to help you get security right the first time. Your first...”
Published
TEXT -
122by Granor, Tamar E.Subjects: “...1. Security programs. 2. Visual FoxPro -- Programming language...”
Published 1998
TEXT -
123by Granor, Tamar E.Subjects: “...1. Visual FoxPro -- Relational database. 2. Security programs...”
Published 2002
TEXT -
124by Anley, ChrisSubjects: “...1. Computer security.2. Data protection.3. Risk assessment...”
Published 2007
TEXT -
125by Dmitry BokoteySubjects: “...CCIE Practical Studies: Security leads you through the requirements of the CCIE Security one-day...”
Published
TEXT -
126by Jon EdneySubjects: “...This book describes an entirely new approach to wireless LAN security based on the latest...”
Published
TEXT -
127by Matt BishopSubjects: “...The nature and challenges of computer security, the relationship between policy and security...”
Published
TEXT -
128by Bambang Purnomosidi Dwi Putranto, Dr,. MMSI,. S.Kom, S.E., Najib, Muhammad - 175410171Subjects: “...Security Auditor...”
Published 2021
-
129by Cottle, SidneySubjects: “...Investment analysis,Securities - United State...”
Published 1989
TEXT -
130by Raymond R. PankoSubjects: “...Synopsis: 1. Framework: Examples of Security. 2. Access Control and Site Security. 3. Review of TCP...”
Published
TEXT -
131by Joel ScambraySubjects: “...High-profile viruses and hacking incidents serve to highlight the dangers of system security...”
Published
TEXT -
132by Chip AndrewsSubjects: “...Addresses SQL Server vulnerabilities and provides security solutions. Covers installation...”
Published
TEXT -
133by Linda VoloninoSubjects: “... to support investment decisions in security technology. It discusses security from the perspective of hackers...”
Published
TEXT -
134by David W. ChapmanSubjects: “...Security continues to be an important topic for networkers looking to protect their organizations...”
Published
TEXT -
135by Adhityo PriyambodoSubjects: “...---- Secure Soket Layer -LDAP Identity Manager -Authentication System -Domain Controller -Secure...”
Published
TEXT -
136by Aidil ChendramataSubjects: “...---- Secure Soket Layer -LDAP Identity Manager -Authentication System -Domain Controller -Secure...”
Published
TEXT -
137by PURWANTO, TeguhSubjects: “...disain interor Kantor Exim Securities...”
Published 1997
Get full text
Tugas Akhir -
138by Francis, Jack ClarkSubjects: “...Investments^bSecurities^cFinancial Futur,...”
Published 1986
TEXT -
139by Scott, David L.Subjects: “...1. Investments -- dictionaries 2. Securities -- Dictionaries...”
Published 1988
TEXT -
140by Benjamin M. LailSubjects: “...Synopsis: Design, build, and implement a secure broadband network infrastructure using...”
Published
TEXT