BOOKS - NETWORK TECHNOLOGIES - Cloud Security Concepts, Methodologies, Tools, and App...
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations) - Information Resources Management Association 2019 EPUB IGI Global BOOKS NETWORK TECHNOLOGIES
ECO~57 kg CO²

3 TON

Views
96408

Telegram
 
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations)
Author: Information Resources Management Association
Year: 2019
Pages: 2218
Format: EPUB
File size: 75.2 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Internet Security: Are You Secured? Full Guideline to Keep Your Virtual Life Safe and Secured
Windows Security Internals A Deep Dive into Windows Authentication, Authorization, and Auditing
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
BDM Online Security For Beginners (BDM Easy to follow user guides)
Azure Security Cookbook: Practical recipes for securing Azure resources and operations
Information Security Incident and Data Breach Management A Step-by-Step Approach
European Response to the Financial Crisis (European Political, Economic and Security Issues)
African Security in the Anthropocene (The Anthropocene: Politik - Economics - Society - Science Book 36)
Safe in Her Bodyguard|s Arms: A Thrilling Bodyguard Romance (Price Security, 2)
Non-Traditional Security Issues in North Korea (Hawai|i Studies on Korea)
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)
Blockchain-Based Data Security in Heterogeneous Communications Networks (Wireless Networks)
Artificial Intelligence and Financial Security Harnessing AI to protect and optimize financial systems
CompTIA Security+ All-in-One Exam Guide, (Exam SY0-501) 5th Edition
International Law and the Use of Force: A Documentary and Reference Guide (Praeger Security International)
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
Information Security Incident and Data Breach Management A Step-by-Step Approach
Microsoft Defender for Endpoint in Depth: Take any organization|s endpoint security to the next level
Bash Scripting for Cybersecurity Mastering Bash for Next-Generation Security Operations
Globalisation and Economic Security in East Asia (Routledge Studies in Globalisation)
Australia and Nuclear War (Routledge Library Editions Nuclear Security)
Network Security through Data Analysis From Data to Action, 2nd Edition
Network Security Assessment Know Your Network, 3rd Edition (Early Release)
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
Web Application Security Exploitation and Countermeasures for Modern Web Applications
Digital Logic Design and Computer Organization with Computer Architecture for Security
Everyman|s Guide to Internet Security The Internet stripped bare
Covert Mission (Team Falcon: Agile Security and Rescue Team 2 #1)
The Home Security Handbook Expert Advice for Keeping Safe at Home
Cryptography and Network Security Principles and Practice, International Edition, 6 edition
Food Security and Food Production: Institutional Challenges in Governance Domain
Wireless Security Architecture Designing and Maintaining Secure Wireless for Enterprise
Himalayan Glaciers: Climate Change, Water Resources, and Water Security
Computer Security Principles and Practice, Global Edition (4th Edition)
Civil Society, Peace, and Power (Peace and Security in the 21st Century)
Microsoft Azure Security Center Second Edition (IT Best Practices - Microsoft Press)
Enterprise Digital Reliability Building Security, Usability, and Digital Trust
The Rembrandt Decision: A Pia Sabel Mystery (Sabel Security Book 12)
Android Forensics Investigation, Analysis and Mobile Security for Google Android