BOOKS - Managing Information Systems Security
Managing Information Systems Security - Denis Trcek  PDF  BOOKS
ECO~17 kg CO²

3 TON

Views
77022

Telegram
 
Managing Information Systems Security
Author: Denis Trcek
Format: PDF
File size: PDF 9.1 MB
Language: English



Pay with Telegram STARS
''

You may also be interested in:

Management Information Systems for Microfinance: Catalyzing Social Innovation for Competitive Advantage
Sensor Network Methodologies for Smart Applications (Advances in Information Security, Privacy, and Ethics)
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, and IT Standards
Information Management and Machine Intelligence: Proceedings of ICIMMI 2019 (Algorithms for Intelligent Systems)
Map Framework: A Formal Model of Maps as a Fundamental Data Type in Information Systems
Formal Ontology in Information Systems: Proceedings of the Seventh International Conference (Fois 2012)
Financial Management Information Systems and Open Budget Data: Do Governments Report on Where the Money Goes?
Computer Systems for Healthcare and Medicine (River Publishers Series in Information Science and Technology)
The State Secrets Privilege and Other Limits on Classified Information (American Political, Economic, and Security Issues)
Systems Performance Modeling (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences Book 4)
Financial Systems in Troubled Waters: Information, Strategies, and Governance to Enhance Performances in Risky Times
Object-Oriented Analysis and Design for Information Systems: Agile Modeling with UML, OCL, and IFML
Energy Systems Security
Sharing Big Data Safely Managing Data Security
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications (Advances in Information Security, 68)
Tourism Security: Strategies for Effectively Managing Travel Risk and Safety by Tarlow Ph.D. in Sociology Texas A and M University, Peter 1st edition (2014) Paperback
Principles of Business Information Systems by Ralph Stair, George Reynolds, Thomas Chesney (2008) Paperback
Transformative AI: Responsible, Transparent, and Trustworthy AI systems (River Publishers Series in Computing and Information Science and Technology)
CISA Certified Information Systems Auditor Study Guide Covers 2024-2029 Exam Objectives
Knowledge Engineering for Modern Information Systems: Methods, Models and Tools (Smart Computing Applications Book 3)
Circuits and Systems for Security and Privacy
Advanced Power Systems and Security
Cryptography and Embedded Systems Security
Cryptography and Embedded Systems Security
Cryptography and Embedded Systems Security
Incident Response for Windows: Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems
Open-Source Security Operations Center (SOC) A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling (Artech House Intelligence and Information Operations)
Machine Learning for Healthcare Systems: Foundations and Applications (River Publishers Series in Computing and Information Science and Technology)
Object-Oriented Analysis and Design for Information Systems Modeling with BPMN, OCL, IFML, and Python 2nd Edition
Object-Oriented Analysis and Design for Information Systems Modeling with BPMN, OCL, IFML, and Python 2nd Edition
Security and Resilience of Cyber Physical Systems
Algorithms: Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences, 17)
Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design (The Morgan Kaufmann Series in Data Management Systems)
Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, … Business Information Processing Boo
An Integrated Approach to Home Security and Safety Systems
SSCP Systems Security Certified Practitioner Practice Exams
Information Security Incident and Data Breach Management A Step-by-Step Approach
Information Security Incident and Data Breach Management A Step-by-Step Approach
Enterprise Information Security Architecture: The Ultimate Step-By-Step Guide