Reducere. Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the...
apress, carti, carte straina, computing & information technology, computer security
Reducere. DescriptionThis book is a part of another book titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition" (687 pages). It is created t...
wenliang du, carti, carte straina, computing & information technology, computer security
Reducere. DescriptionThis book is a part of another book titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition" (687 pages). It is created t...
wenliang du, carti, carte straina, computing & information technology, computer security
Reducere. Prepare for the CompTIA Security certification exam that covers the skills required to perform core security functions and pursue a career in IT. Y...
apress, carti, carte straina, computing & information technology, computer security
Reducere. DescriptionThis book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer and In...
wenliang du, carti, carte straina, computing & information technology, computer security
Reducere. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any onlin...
mcgraw-hill companies, carti, carte straina, computing & information technology, computer security
Reducere. DescriptionWith their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportuniti...
o'reilly media, carti, carte straina, computing & information technology, computer security
Reducere. INFORMATION SECURITY Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised mater...
wiley, carti, carte straina, computing & information technology, computer security
Reducere. As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for informatio...
cornell university press, carti, carte straina, computing & information technology, computer security
Reducere. DescriptionThis book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer and In...
wenliang du, carti, carte straina, computing & information technology, computer security
Reducere. DescriptionAs a senior himself, Steve Krantz understands the needs and challenges that seniors face in using their computers, smartphones and table...
independently published, carti, carte straina, computing & information technology, computer security
Reducere. Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and ...
apress, carti, carte straina, computing & information technology, computer security
Reducere. In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know about IBM i ...
mc press, carti, carte straina, computing & information technology, computer security
Reducere. DescriptionSecurity Testing with Raspberry PiWant to know how to run Kali Linux on a Raspberry Pi? Trying to learn Ethical Hacking on a budget? Wan...
independently published, carti, carte straina, computing & information technology, computer security
Reducere. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any onlin...
mcgraw-hill education, carti, carte straina, computing & information technology, computer security
Reducere. Chapter 1. Introduction to Snowflake What's happening to data Where Snowflake fits in Building your first Snowflake Data Warehouse Chapter 2. Accou...
apress, carti, carte straina, computing & information technology, computer security
Reducere. If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove tha...
lioncrest publishing, carti, carte straina, computing & information technology, computer security