BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
51056

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Database Security
Database and Application Security: A Practitioner|s Guide
Database and Application Security A Practitioner|s Guide (Final)
Database and Application Security A Practitioner|s Guide (Final)
Database and Application Security A Practitioner|s Guide (Early Release)
Database and Application Security A Practitioner|s Guide (Early Release)
MySQL 8 Cookbook Ready solutions to achieve highest levels of enterprise database scalability, security, reliability, and uptime
Database Reliability Engineering Designing and Operating Resilient Database Systems (<u>Early Release</u>)
Hands-on Database An IntroductIon to Database Design and Development, Second Edition
Database Fundamentals: Strategies for Efficient Access to Information and Enhanced Decision Making (Mastering Database Management Series)
35 Database Examples A Database Reference Book For Anyone
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
SQL For Beginners A Step-by-Step Guide to Learn SQL (Structured Query Language) from Installation to Database Management and Database Administration
SQL Survival Guide: Database basics for beginners: Learn SQL from Scratch and Save Time and Effort (Database books: design and SQL for beginners and dummies)
Human Factor in Nuclear Security: Establishing and Optimizing Security Culture (Advanced Sciences and Technologies for Security Applications)
Singer|s Security: An MM First Time Bodyguard Romance (Alden Security Book 2)
Social Security Disability Insurance (American Political, Economic, and Security Issues)
Thor|s Microsoft Security Bible A Collection of Practical Security Techniques
Agile Application Security Enabling Security in a Continuous Delivery Pipeline
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges
Rethinking (In)Security in the European Union: The Migration-Identity-Security Nexus
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Enhancing IoT Security A holistic approach to security for connected platforms
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
CompTIA Security+ Guide to Network Security Fundamentals, Seventh Edition
Enhancing IoT Security A holistic approach to security for connected platforms
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles
Japan s Evolving Notion of National Security (Asian Political, Economic and Security Issues)
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Her Private Security Detail: A Thrilling Bodyguard Romance (The Toure Security Group Book 2)
Enhancing IoT Security: A holistic approach to security for connected platforms (English Edition)
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Normalizing Japan: Politics, Identity, and the Evolution of Security Practice (Studies in Asian Security)
The Supply Side of Security: A Market Theory of Military Alliances (Studies in Asian Security)
Living Weapons: Biological Warfare and International Security (Cornell Studies in Security Affairs)
The Cybersecurity Mesh Architecture Composable, flexible, and scalable security approach for a resilient security ecosystem
The Cybersecurity Mesh Architecture Composable, flexible, and scalable security approach for a resilient security ecosystem
Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications)
The Hidden Potential of DNS In Security: Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals