BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
51076

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Mike Meyers| CompTIA Security+ Certification Guide(Exam SY0-601), Third Edition
Emerging and Readily Available Technologies and National Security: A Framework for Addressing Ethical, Legal, and Societal Issues
Unrivaled: Why America Will Remain the World|s Sole Superpower (Cornell Studies in Security Affairs)
Nessus, Snort, & Ethereal Power Tools Customizing Open Source Security Applications
Personal Safety and Security Playbook: Risk Mitigation Guidance for Individuals, Families, Organizations, and Communities
Just Politics: Human Rights and the Foreign Policy of Great Powers (Cornell Studies in Security Affairs)
Bombs And Bombings: A Handbook To Protection, Security, Disposal, And Investigation For Industry, Police And Fire Departments
Security in IoT Social Networks (Intelligent Data-Centric Systems Sensor Collected Intelligence)
Criminologies of the Military: Militarism, National Security and Justice (Onati International Series in Law and Society)
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide, 2nd Edition
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
Exporting the Bomb: Technology Transfer and the Spread of Nuclear Weapons (Cornell Studies in Security Affairs)
Techniques for Designing and Analyzing Algorithms (Chapman and Hall CRC Cryptography and Network Security Series)
Intelligent Systems for Stability Assessment and Control of Smart Power Grids Security Analysis, Optimization
The Web Application Hacker|s Handbook Finding and Exploiting Security Flaws, 2nd Edition
The Modern Security Operations Center The People, Process, and Technology for Operating SOC Services (Final)
Vagueness as a Political Strategy Weasel Words in Security Council Resolutions Relating to the Second Gulf War
Proceedings of International Symposium on Sensor Networks, Systems and Security: Advances in Computing and Networking with Applications
The Ideological Origins of Great Power Politics, 1789-1989 (Cornell Studies in Security Affairs)
Gender, War, and World Order: A Study of Public Opinion (Cornell Studies in Security Affairs)
Constitutional Law of the EU|s Common Foreign and Security Policy: Competence and Institutions in External Relations
The State Secrets Privilege and Other Limits on Classified Information (American Political, Economic, and Security Issues)
Society and Democracy in South Korea and Indonesia (Security, Development and Human Rights in East Asia)
Cyber Defense Mechanisms Security, Privacy, and Challenges (Artificial Intelligence (AI) Elementary to Advanced Practices)
Waging War Without Warriors?: The Changing Culture of Military Conflict (Iiss Studies in International Security)
England|s Road to Social Security: From the Statute of Laborers in 1349 to the Beveridge Report of 1942
Reconceptualizing Deterrence: Nudging Toward Rationality in Middle Eastern Rivalries (Routledge Global Security Studies)
CCNP Security Identity Management SISE 300-715 Official Cert Guide (Final)
ExamWise For MCP MCSE Certification : Security for a Microsoft Windows 2000 Network Exam 70-220
The Sources of Military Doctrine: France, Britain, and Germany Between the World Wars (Cornell Studies in Security Affairs)
The Politics of German Defence and Security: Policy Leadership and Military Reform in the post-Cold War Era
Reassuring the Reluctant Warriors: U.S. Civil-Military Relations and Multilateral Intervention (Cornell Studies in Security Affairs)
Addressing Water Security in the People|s Republic of China: The 13th Five-Year Plan (2016-2020) and Beyond
CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-003, 3rd Edition
Wronged by Empire: Post-Imperial Ideology and Foreign Policy in India and China (Studies in Asian Security)
The DevOps Handbook How to Create World-Class Agility, Reliability, & Security in Technology Organizations, Second Edition
Strategic Adjustment and the Rise of China: Power and Politics in East Asia (Cornell Studies in Security Affairs)
Learn Penetration Testing with Python 3.x An Ethical Hacker|s Blueprint for Offensive Security, 2nd Edition
The Central Role of Thailand|s Internal Security Operations Command in the Post-Counter-insurgency Period
Total Confinement: Madness and Reason in the Maximum Security Prison (Volume 7) (California Series in Public Anthropology)