BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
51070

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Information Security Incident and Data Breach Management A Step-by-Step Approach
Azure Security Cookbook: Practical recipes for securing Azure resources and operations
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
Redefining Mexican and quot;Security and quot;: Society, State, and Region Under Nafta
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
BDM Online Security For Beginners (BDM Easy to follow user guides)
European Response to the Financial Crisis (European Political, Economic and Security Issues)
AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)
Microsoft Defender for Endpoint in Depth: Take any organization|s endpoint security to the next level
Mastering Secure Java Applications Navigating security in cloud and microservices for Java
International Law and the Use of Force: A Documentary and Reference Guide (Praeger Security International)
Mastering Secure Java Applications Navigating security in cloud and microservices for Java
Non-Traditional Security Issues in North Korea (Hawai|i Studies on Korea)
CompTIA Security+ All-in-One Exam Guide, (Exam SY0-501) 5th Edition
Artificial Intelligence and Financial Security Harnessing AI to protect and optimize financial systems
African Security in the Anthropocene (The Anthropocene: Politik - Economics - Society - Science Book 36)
Safe in Her Bodyguard|s Arms: A Thrilling Bodyguard Romance (Price Security, 2)
Globalisation and Economic Security in East Asia (Routledge Studies in Globalisation)
Digital Logic Design and Computer Organization with Computer Architecture for Security
Australia and Nuclear War (Routledge Library Editions Nuclear Security)
Network Security Assessment Know Your Network, 3rd Edition (Early Release)
Bash Scripting for Cybersecurity Mastering Bash for Next-Generation Security Operations
Cryptography and Network Security Principles and Practice, International Edition, 6 edition
The Home Security Handbook Expert Advice for Keeping Safe at Home
Computer Security Principles and Practice, Global Edition (4th Edition)
Wireless Security Architecture Designing and Maintaining Secure Wireless for Enterprise
Everyman|s Guide to Internet Security The Internet stripped bare
Android Forensics Investigation, Analysis and Mobile Security for Google Android
Microsoft Azure Security Center Second Edition (IT Best Practices - Microsoft Press)
Enterprise Digital Reliability Building Security, Usability, and Digital Trust
Bash Scripting for Cybersecurity Mastering Bash for Next-Generation Security Operations
CompTIA Security+ SY0-701 Cert Guide (Certification Guide)
Covert Mission (Team Falcon: Agile Security and Rescue Team 2 #1)
Food Security and Food Production: Institutional Challenges in Governance Domain
Web Application Security Exploitation and Countermeasures for Modern Web Applications
Unidentified: The Emerald Tear The Emerald Butterfly (Treasure Hunter Security, #7)
Enterprise Information Security Architecture: The Ultimate Step-By-Step Guide
Network Security through Data Analysis From Data to Action, 2nd Edition
The Rembrandt Decision: A Pia Sabel Mystery (Sabel Security Book 12)