BOOKS - PROGRAMMING - Information Security Principles and Practices, 2nd Edition
Information Security Principles and Practices, 2nd Edition - Mark S. Merkow, Jim Breithaupt 2014 EPUB Pearson BOOKS PROGRAMMING
ECO~15 kg CO²

1 TON

Views
54243

Telegram
 
Information Security Principles and Practices, 2nd Edition
Author: Mark S. Merkow, Jim Breithaupt
Year: 2014
Pages: 368
Format: EPUB
File size: 10 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Best Practices for Graphic Designers, Grids and Page Layouts An Essential Guide for Understanding and Applying Page Design Principles
The Complete Herbal Tutor The Definitive Guide to the Principles and Practices of Herbal Medicine - 2nd Edition Revised and Expanded
Information Privacy Engineering and Privacy by Design Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices
Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling (Artech House Intelligence and Information Operations)
Algorithms: Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences, 17)
Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, … Business Information Processing Boo
Information Security Incident and Data Breach Management A Step-by-Step Approach
Information Security Incident and Data Breach Management A Step-by-Step Approach
Enterprise Information Security Architecture: The Ultimate Step-By-Step Guide
Microsoft Azure Security Center Second Edition (IT Best Practices - Microsoft Press)
A New Approach to the Nuclear Fuel Cycle: Best Practices for Security, Nonproliferation, and Sustainable Nuclear Energy (CSIS Reports)
Fault Analysis in Cryptography (Information Security and Cryptography)
Kickstart Software Design Architecture Transform Your Software Development Journey with Key Principles and Advanced Practices in Architecture, Microservices, and Cloud Computing
Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
Cryptography and Network Security Principles and Practice, 8th Edition, Global Edition
Cryptography and Network Security Principles and Practice, International Edition, 6 edition
Computer Security Principles and Practice, Global Edition (4th Edition)
Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings (Communications in Computer and Information Science)
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences and Innovative Business Technology)
Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, … and Communication Technology, 658)
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers (Lecture Notes in Computer Science Book 13837)
Data Analytics Principles, Tools, and Practices A Complete Guide for Advanced Data Analytics Using the Latest Trends, Tools
Human Factor in Nuclear Security: Establishing and Optimizing Security Culture (Advanced Sciences and Technologies for Security Applications)
What Is Computer Science?: An Information Security Perspective (Undergraduate Topics in Computer Science)
Searching for Health Information: The Cancer Information Service Model (Anniversary Collection)
No Bull Information: A Humorous Practical Guide to Help Americans Adapt to the Information Age
Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Managing Meaning in Ukraine: Information, Communication, and Narration since the Euromaidan Revolution (Information Policy Series)
Information Architecture and UX Design The Integration of Information Spaces, Third Edition
Human Information Retrieval (History and Foundations of Information Science)
Advances in Info-Metrics Information and Information Processing across Disciplines
Ultimate AWS Certified Cloud Practitioner|s Exam Guide Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and RDS, and Crack AWS CLF-C02 Certification
Ultimate AWS Certified Cloud Practitioner|s Exam Guide Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and RDS, and Crack AWS CLF-C02 Certification
Entity Information Life Cycle for Big data Master Data Management and Information Integration