by
Alberts, Christopher, author.
Format:
Electronic Resources
Excerpt:
Computer security -- Management.
by
Adams, Carlisle, author.
Format:
Electronic Resources
Excerpt:
Computer security -- Management.
View Other Search Results
by
Kinshuk.
Format:
Electronic Resources
Excerpt:
data management practices among parks management students -- Academic and scholarly discussion lists
by
Raitt, David.
Format:
Electronic Resources
Excerpt:
computer games -- Application of computer games in the field of education -- From computer games to
by
Burgess, Stephen, 1958-
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93070-835-8
Format:
Electronic Resources
Excerpt:
systems in small businesses / Yangqing Duan, Russell Kinman, Mark Xu -- 9. Computer security in small
by
Doruk, Alpay.
Format:
Manuscript
Excerpt:
Management Systems are used to protect information and computer assets from intrusions. An organization
by
Dhillon, Gurpreet, 1963-
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-93070-811-2
Format:
Electronic Resources
Excerpt:
Pascalev -- Social Responsibility in IS/IT Project Management / Joseph T. Gilbert -- Self-Employed and
by
Syngress.
Format:
Electronic Resources
Excerpt:
requirements. The Next Generation User Interface is easy to use and offers unparalleled security management
by
Crawford, Roger.
Format:
Electronic Resources
Excerpt:
-- Software security -- Summary -- 7 HEALTH AND SAFETY -- Summary -- 8 EQUAL OPPORTUNITIES -- Gender
by
Ford, Jerry Lee.
Format:
Electronic Resources
Excerpt:
III: ADVANCED ADMINISTRATION -- Chapter 9 Security Administration -- Overview of Security
by
Redbooks, IBM.
Format:
Electronic Resources
Excerpt:
management for Linux for zSeries and S/390 -- 14.1.2 eTrust: Security for Linux for zSeries and S/390 -- 14.1
Limit Search Results
Narrowed by: