by
Norman, Thomas, CSC.
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Table of contents only http://www.loc.gov/catdir/toc/ecip074/2006038020.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0703/2006038020-d.html
Table of contents only http://www.loc.gov/catdir/toc/ecip074/2006038020.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0703/2006038020-d.html
Format:
Electronic Resources
Excerpt:
, include material not available in any other book. * Centralize monitoring of security, of business
by
Bhardwaj, Pawan K.
Format:
Electronic Resources
Excerpt:
competition for a core tool for Windows administrators. *Builds on success of other books in the series
View Other Search Results
by
Norman, Thomas L.
Format:
Electronic Resources
Excerpt:
how it's done, and the tactical section provides the cultural knowledge that leads to project success
by
Touhill, Gregory J.
Format:
Electronic Resources
Excerpt:
OWNS RISK IN YOUR BUSINESS? -- 3.2 WHAT ARE YOUR RISKS? -- 3.2.1 Threats to Your Intellectual Property
by
Snedaker, Susan.
Format:
Electronic Resources
Excerpt:
-- References -- Business Continuity and Disaster Recovery in Energy/Utilities -- Introduction -- Integrating BC
Limit Search Results
Narrowed by: