BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
51078

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

No Exit: America and the German Problem, 1943-1954 (Cornell Studies in Security Affairs)
Network Performance and Security Testing and Analyzing Using Open Source and Low-Cost Tools
The Unhackable Internet: How Rebuilding Cyberspace Can Create Real Security and Prevent Financial Collapse
Saved from Revenge (Police and Fire: Operation Alpha) (Blade and Arrow Security Book 1)
Snuggle and Play Crochet 40 amigurumi patterns for lovey security blankets and matching toys
Implementing NAP and NAC Security Technologies The Complete Guide to Network Access Control
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals, 2nd Edition
Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in Iot
Insanity Defense Why Our Failure to Confront Hard National Security Problems Makes Us Less Safe
Practical Cloud Security A Guide for Secure Design and Deployment, 2nd Edition (Final)
Balancing Risks: Great Power Intervention in the Periphery (Cornell Studies in Security Affairs)
Understand the Cyber Attacker Mindset Build a Strategic Security Programme to Counteract Threats
Janes Sentinel Security Assessment North Africa August 2001-January 2002
Cyber Crime Investigations Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutor
Dying to Learn: Wartime Lessons from the Western Front (Cornell Studies in Security Affairs)
Advanced Computer Science Applications Recent Trends in AI, Machine Learning, and Network Security
The Unhackable Internet How Rebuilding Cyberspace Can Create Real Security and Prevent Financial Collapse
Software-Defined Network Frameworks: Security Issues and Use Cases (Computational Intelligence Techniques)
Critical Infrastructure Protection in Homeland Security Defending a Networked Nation 3rd Edition
Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies)
Smart Grid Resilience: Extreme Weather, Cyber-Physical Security, and System Interdependency
Optimizing IEEE 802.11i Resource and Security Essentials For Mobile and Stationary Devices
The Arms of the Future: Technology and Close Combat in the Twenty-First Century (New Perspectives on Defence and Security)
Introduction to Machine Learning with Security Theory and Practice Using Python in the Cloud, 2nd Edition
Fighting for Scarlett (Special Forces: Operation Alpha; Prey Security: Athena Team #1)
The Safety Trap: A Security Expert|s Secrets for Staying Safe in a Dangerous World
Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33
Ethnic Diasporas and the Canada-United States Security Community: From the Civil War to Today
Understand the Cyber Attacker Mindset Build a Strategic Security Programme to Counteract Threats
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, and IT Standards
Jane’s Sentinel Security Assessment West Africa September 2001-February 2002
The Official CompTIA Security+ Certification Self-Paced Study Guide (Exam SY0-601)
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
Hard Target: Sanctions, Inducements, and the Case of North Korea (Studies in Asian Security)
Certified Kubernetes Security Specialist (CKS) Study Guide: In-Depth Guidance and Practice
Chasing Dragons: Security, Identity, and Illicit Drugs in Canada by Kyle Grayson (2008-04-04)
The Justice Dilemma: Leaders and Exile in an Era of Accountability (Cornell Studies in Security Affairs)
Cyber Security in Parallel and Distributed Computing Concepts, Techniques, Applications and Case Studies
Networks of Rebellion: Explaining Insurgent Cohesion and Collapse (Cornell Studies in Security Affairs)
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Second Edition