BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
51059

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Advanced Database Systems
Database Management System
Fundamentals of Database Systems
Mobile Database Systems
Concepts of Database Management
Build Your Own Database From Scratch in Go, 2E
Fundamentals of Database Systems
Fundamentals of Database Systems
Handbook of Research on Intelligent Data Processing and Information Security Systems (Advances in Information Security, Privacy, and Ethics)
Intelligence and Information Policy for National Security: Key Terms and Concepts (Security and Professional Intelligence Education Series)
Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less
Community Resilience When Disaster Strikes: Security and Community Health in UK Flood Zones (Advanced Sciences and Technologies for Security Applications)
Ansible For Security by Examples: 100+ Automation Examples to Automate Security and Verify Compliance for IT Modern Infrastructure
The Security Risk Assessment Handbook A Complete Guide for Performing Security Risk Assessments, 3rd Edition
The Temple of Django Database Performance
App Inventor 2 with MySQL Database
Aspect-Oriented Database Systems
The Afrikamutze Database Part 2 The Fake
Teradata Physical Database Design
Database Systems,14th Edition
The Temple of Django Database Performance
Database Concepts (8th Edition)
Java 6 JDBC and database applications
Oracle Database 12c SQL
The creation and management of database systems
The Temple of Django Database Performance
DBMS Database Management System
Cyber Security The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Machine Learning for Computer and Cyber Security Principle, Algorithms, and Practices (Cyber Ecosystem and Security)
Information Security Management Systems A Novel Framework and Software as a Tool for Compliance with Information Security Standard
Cyber Security Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Cyber Space and Outer Space Security (River Publishers Series in Digital Security and Forensics)
Cyber Security Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Cyber Security and Network Security
Ultimate Splunk for Cybersecurity Practical Strategies for SIEM Using Splunk|s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings (Security and Cryptology)
Ultimate Splunk for Cybersecurity Practical Strategies for SIEM Using Splunk|s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Balancing Liberty and Security: An Ethical Study of U.S. Foreign Intelligence Surveillance, 2001-2009 (Volume 15) (Security and Professional Intelligence Education Series, 15)
Google Cloud Platform (GCP) Professional Cloud Security Engineer Certification Companion Learn and Apply Security Design Concepts to Ace the Exam
Integrated Security Technologies and Solutions - Volume II Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity, and Virtualization