BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
51077

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Empirical Cloud Security Practical Intelligence to Evaluate Risks and Attacks, 2nd Edition
Escaping the Deadly Embrace: How Encirclement Causes Major Wars (Cornell Studies in Security Affairs)
Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies
A Practical Guide on Security and Privacy in Cyber-Physical Systems Foundations, Applications and Limitations
Banning Landmines: Disarmament, Citizen Diplomacy, and Human Security (National State Papers (rl)
100 to 1 in the Stock Market: A Distinguished Security Analyst Tells How to Make More of Your Investment Opportunities
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
AI, Blockchain and Self-Sovereign Identity in Higher Education (Advanced Sciences and Technologies for Security Applications)
Identities, Borderscapes, Orders: (In)Security, (Im)Mobility and Crisis in the EU and Ukraine (Frontiers in International Relations)
Application Security Program Handbook A guide for software engineers and team leaders (MEAP)
Delaney|s Bodyguard (Special Forces: Operation Alpha) (Trident Security Book 1)
The Maritime Dimension of International Security Terrorism, Piracy, and Challenges for the United States (2008)
Energy|s Digital Future: Harnessing Innovation for American Resilience and National Security
Precarious Urbanism: Displacement, Belonging and the Reconstruction of Somali Cities (Spaces of Peace, Security and Development)
Sabato al Parco - Un racconto della ‘Justice Security| (Italian Edition)
Japan|s Security Renaissance: New Policies and Politics for the Twenty-First Century (Contemporary Asia in the World)
Physical Biometrics for Hardware Security of DSP and Machine Learning Coprocessors (Materials, Circuits and Devices)
Menace to Empire: Anticolonial Solidarities and the Transpacific Origins of the US Security State (Volume 63) (American Crossroads)
Decades of Decadence: How Our Spoiled Elites Blew America|s Inheritance of Liberty, Security, and Prosperity
Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War (Cornell Studies in Security Affairs)
Lacey|s Fight (Special Forces: Operation Alpha; Prey Security: Artemis Team #3)
New Media Politics: Rethinking Activism and National Security in Cyberspace by Banu Baybars-Hawks (2015-01-07)
Industrial Internet of Things Security Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments
Building a Future-Proof Cloud Infrastructure A Unified Architecture for Network, Security, and Storage Services
Emerging Technologies and the Application of WSN and IoT Smart Surveillance, Public Security, and Safety Challenges
Israel and Conventional Deterrence: Border Warfare from 1953 to 1970 (Cornell Studies in Security Affairs)
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests, 2nd Edition
Land and Loyalty: Security and the Development of Property Rights in Thailand (Cornell Studies in Political Economy)
America|s Dream Palace: Middle East Expertise and the Rise of the National Security State
Catastrophic Success: Why Foreign-Imposed Regime Change Goes Wrong (Cornell Studies in Security Affairs)
Rebel Power: Why National Movements Compete, Fight, and Win (Cornell Studies in Security Affairs)
The Civilian-Military Divide Obstacles to the Integration of Intelligence in the United States (Praeger Security International)
Inauspicious Beginnings: Principal Powers and International Security Institutions After the Cold War, 1989-1999
Oil and Security Policies: Saudi Arabia, 1950-2012 (International Comparative Social Studies, 32)
Industrial Internet of Things Security Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments
The Modern Security Operations Center The People, Process, and Technology for Operating SOC Services (Final)
All Options on the Table: Leaders, Preventive War, and Nuclear Proliferation (Cornell Studies in Security Affairs)
Iran in the Twentieth Century: A Political History (Adamantine Studies in International Relations and World Security)
Thailand and the United States: Development, Security, and Foreign Aid (STUDIES OF THE EAST ASIAN INSTITUTE)
Emerging Technologies and the Application of WSN and IoT Smart Surveillance, Public Security, and Safety Challenges