BOOKS - NETWORK TECHNOLOGIES - Cloud Security Concepts, Methodologies, Tools, and App...
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations) - Information Resources Management Association 2019 EPUB IGI Global BOOKS NETWORK TECHNOLOGIES
ECO~57 kg CO²

3 TON

Views
96406

Telegram
 
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations)
Author: Information Resources Management Association
Year: 2019
Pages: 2218
Format: EPUB
File size: 75.2 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Enterprise Information Security Architecture: The Ultimate Step-By-Step Guide
CompTIA Security+ SY0-701 Cert Guide (Certification Guide)
Unidentified: The Emerald Tear The Emerald Butterfly (Treasure Hunter Security, #7)
Bash Scripting for Cybersecurity Mastering Bash for Next-Generation Security Operations
The Morpheus Decision: A Pia Sabel Mystery (Sabel Security Book 10)
Hacking Exposed Web Applications Web Application Security Secrets and Solutions, Third Edition
The Russian FSB: A Concise History of the Federal Security Service (Concise Histories of Intelligence)
Cisco Next-Generation Security Solutions All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Critical Security Controls for Effective Cyber Defense A Comprehensive Guide to CIS 18 Controls
The Hardware Hacking Handbook Breaking Embedded Security with Hardware Attacks (Early Access)
CWSP Certified Wireless Security Professional Study Guide Exam CWSP-205
Bodyguard Wolf Shifter: A Paranormal Romance (Special Wolf Security Agency Book 1)
Journalism and the Nsa Revelations: Privacy, Security and the Press (Reuters Institute for the Study of Journalism)
Building Intelligent Systems Using Machine Learning and Deep Learning Security, Applications and Its Challenges
Building Intelligent Systems Using Machine Learning and Deep Learning Security, Applications and Its Challenges
Mastering Time Series Analysis and Forecasting with Python: Bridging Theory and Practice Through Insights, Techniques, and Tools for Effective Time Series Analysis in Python (English Edition)
Music Theory: From Beginner to Expert - The Ultimate Step-By-Step Guide to Understanding and Learning Music Theory Effortlessly (Essential Learning Tools for Musicians Book 1)
Indigenous Conflict Management Strategies in West Africa: Beyond Right and Wrong (Conflict and Security in the Developing World)
Functional Programming in Go: Apply functional techniques in Golang to improve the testability, readability, and security of your code
East Asia in Transition: Economic and Security Challenges (HSBC Bank Canada Papers on Asia)
Super Bomb: Organizational Conflict and the Development of the Hydrogen Bomb (Cornell Studies in Security Affairs)
Web Application Security Exploitation and Countermeasures for Modern Web Applications, 2nd Edition (Final)
Police Reform in Turkey: Human Security, Gender and State Violence Under Erdogan (Contemporary Turkey)
Computer Engineering 2 books in 1 Linux for Beginners+Cyber Security, How to Win with Cyberattacks and How to Use Linux Like a Pro
Web Application Security Exploitation and Countermeasures for Modern Web Applications, 2nd Edition (Final)
Defense 2045: Assessing the Future Security Environment and Implications for Defense Policymakers (CSIS Reports)
Data-Centric Security in Software Defined Networks (SDN) (Studies in Big Data, 149)
The U.S.-Singapore Free Trade Agreement: An American Perspective on Power, Trade and Security in the Asia Pacific
AWS All-in-one Security Guide Design, Build, Monitor, and Manage a Fortified Application Ecosystem on AWS
Enterprise Fortress The Ultimate Handbook for Enterprise Security Architecture
The Network Security Test Lab A Step-by-Step Guide
Guide to Computer Network Security (Texts in Computer Science)
International Relations Theory of War (Praeger Security International)
The Routledge Handbook of Transatlantic Security (Routledge Handbooks) (2010-07-30)
Mastering Linux Security Step by Step Practical Guide
UNIX System Security A Guide for Users and System Administrators
The Hybrid Age: International Security in the Era of Hybrid Warfare
Sharing Big Data Safely Managing Data Security
Hacking Exposed Linux Linux Security Secrets and Solutions
Hacking Exposed Web 2.0 Web 2.0 Security Secrets and Solutions