BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
51079

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Deterrence and Strategic Culture: Chinese-American Confrontations, 1949-1958 (Cornell Studies in Security Affairs)
Research Universities and the Future of America: Ten Breakthrough Actions Vital to Our Nation|s Prosperity and Security
MDM Fundamentals, Security, and the Modern Desktop Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response
The Developer|s Playbook for Large Language Model Security Building Secure AI Applications (Final Release)
Capacity Building in the Fight against Terrorism (NATO Science for Peace and Security: Sub-Series E: Human and Societal Dynamics)
No Grid Survival Projects Bible Definitive Strategies for Sustainable Living, Food Supply, Home Security
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Cross-Site Scripting Attacks Classification, Attack and Countermeasures (Security, Privacy and Trust in Mobile Communications)
CCNP Security Identity Management SISE 300-715 Official Cert Guide (Rough Cuts)
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
Peace Regime Building on the Korean Peninsula and Northeast Asian Security Cooperation by Seung-Ho Joo (2010-07-28)
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security
Maritime Security of the Arab Gulf States: Analysis of Current Threats, Confrontation Mechanisms, and Future Challenges
A MacKenzie Security Omnibus 1: Seduction and Sapphires, Shadows and Silk, Secrets and Satin, Sins and Scarlet Lace
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications (Advances in Information Security, 68)
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
Shattered Illusions: KGB Cold War Espionage in Canada (Security and Professional Intelligence Education Series)
Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation (Advanced Sciences and Technologies for Security Applications)
Managing World Order: United Nations Peace Operations and the Security Agenda (Library of International Relations)
Food Security: Quality Management, Issues and Economic Implications. Edited by Maddox A. Jones, Francisco E. Hernandez
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Shadowed Obsession: An Action-Packed Romantic Suspense Thriller (Shadow Defense Security Series Book 1)
The Development of Nuclear Propulsion in the Royal Navy, 1946-1975 (Security, Conflict and Cooperation in the Contemporary World)
Stand on Guard: Reassessing Threats to Canada|s National Security (Munk Series on Global Affairs)
Learn Penetration Testing with Python 3.x An Ethical Hacker|s Blueprint for Offensive Security, 2nd Edition
No Grid Survival Projects Bible Definitive Strategies for Sustainable Living, Food Supply, Home Security
Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling (Artech House Intelligence and Information Operations)
Enduring Territorial Disputes: Strategies of Bargaining, Coercive Diplomacy, and Settlement (Studies in Security and International Affairs Ser.)
North Korean Foreign Relations in the Post-Cold War World (Asian Political, Economic and Security Issues)
The History of Manchuria, 1840-1948: A Sino-Russo-Japanese Triangle (Politics, Security and Society in Asia Pacific)
Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs (T-Labs Series in Telecommunication Services)
Enhancing Cooperation in Defence against Terrorism - Volume 99 NATO Science for Peace and Security Series - E: Human and Societal Dynamics
A Professional|s Guide to Ending Violence Quickly: How Bouncers, Bodyguards, and Other Security Professionals Handle Ugly Situations
Dirty Mouth: A Sweet and Steamy Alpha Male and Curvy Woman Romance (Rock Hard Security Book 3)
The Hegemon|s Tool Kit: US Leadership and the Politics of the Nuclear Nonproliferation Regime (Cornell Studies in Security Affairs)
Growing American Rubber: Strategic Plants and the Politics of National Security (Studies in Modern Science, Technology, and the Environment)
From Solidarity to Martial Law: The Polish Crisis of 1980-1982 (National Security Archive Cold War Reader)