BOOKS - NETWORK TECHNOLOGIES - Cloud Security Concepts, Methodologies, Tools, and App...
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations) - Information Resources Management Association 2019 EPUB IGI Global BOOKS NETWORK TECHNOLOGIES
ECO~57 kg CO²

3 TON

Views
96411

Telegram
 
Cloud Security Concepts, Methodologies, Tools, and Applications (Critical Explorations)
Author: Information Resources Management Association
Year: 2019
Pages: 2218
Format: EPUB
File size: 75.2 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Learn Penetration Testing with Python 3.x An Ethical Hacker|s Blueprint for Offensive Security, 2nd Edition
Shattered Illusions: KGB Cold War Espionage in Canada (Security and Professional Intelligence Education Series)
(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Addressing Water Security in the People|s Republic of China: The 13th Five-Year Plan (2016-2020) and Beyond
The Politics of German Defence and Security: Policy Leadership and Military Reform in the post-Cold War Era
CCNP Security Identity Management SISE 300-715 Official Cert Guide (Rough Cuts)
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security
Cross-Site Scripting Attacks Classification, Attack and Countermeasures (Security, Privacy and Trust in Mobile Communications)
Peace Regime Building on the Korean Peninsula and Northeast Asian Security Cooperation by Seung-Ho Joo (2010-07-28)
The Development of Nuclear Propulsion in the Royal Navy, 1946-1975 (Security, Conflict and Cooperation in the Contemporary World)
Maritime Security of the Arab Gulf States: Analysis of Current Threats, Confrontation Mechanisms, and Future Challenges
Total Confinement: Madness and Reason in the Maximum Security Prison (Volume 7) (California Series in Public Anthropology)
Wronged by Empire: Post-Imperial Ideology and Foreign Policy in India and China (Studies in Asian Security)
No Grid Survival Projects Bible Definitive Strategies for Sustainable Living, Food Supply, Home Security
Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation (Advanced Sciences and Technologies for Security Applications)
The Central Role of Thailand|s Internal Security Operations Command in the Post-Counter-insurgency Period
Reassuring the Reluctant Warriors: U.S. Civil-Military Relations and Multilateral Intervention (Cornell Studies in Security Affairs)
Shadowed Obsession: An Action-Packed Romantic Suspense Thriller (Shadow Defense Security Series Book 1)
Food Security: Quality Management, Issues and Economic Implications. Edited by Maddox A. Jones, Francisco E. Hernandez
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security
MDM Fundamentals, Security, and the Modern Desktop Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
Learn Penetration Testing with Python 3.x An Ethical Hacker|s Blueprint for Offensive Security, 2nd Edition
Strategic Adjustment and the Rise of China: Power and Politics in East Asia (Cornell Studies in Security Affairs)
A MacKenzie Security Omnibus 1: Seduction and Sapphires, Shadows and Silk, Secrets and Satin, Sins and Scarlet Lace
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Deterrence and Strategic Culture: Chinese-American Confrontations, 1949-1958 (Cornell Studies in Security Affairs)
Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
The DevOps Handbook How to Create World-Class Agility, Reliability, & Security in Technology Organizations, Second Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
Stand on Guard: Reassessing Threats to Canada|s National Security (Munk Series on Global Affairs)
Research Universities and the Future of America: Ten Breakthrough Actions Vital to Our Nation|s Prosperity and Security
Capacity Building in the Fight against Terrorism (NATO Science for Peace and Security: Sub-Series E: Human and Societal Dynamics)
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications (Advances in Information Security, 68)
The Developer|s Playbook for Large Language Model Security Building Secure AI Applications (Final Release)
Managing World Order: United Nations Peace Operations and the Security Agenda (Library of International Relations)
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
Computer Science Principles: The Foundational Concepts of Computer Science
Learning OpenCV 5 Computer Vision with Python, Fourth Edition: Tackle computer vision and machine learning with the newest tools, techniques and algorithms
The Reality Shifting Handbook: A Step-by-Step Guide to Creating Your Desired Reality with Scripting Templates, Shifting Methods, and More Essential Tools