Search ResultsElektronik Kaynaklar
by
Laurent, Maryline, editor.
Format:
Alıntı:
Digital identity management / Laurent, Maryline, editor.
by
Tiller, James S.
Format:
Alıntı:
Adaptive security management architecture Tiller, James S.
by
Snedaker, Susan.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490764
Format:
Alıntı:
Syngress IT security project management handbook / Snedaker, Susan.
by
Bertino, Elisa.
Format:
Alıntı:
Identity management concepts, technologies, and systems / Bertino, Elisa.
by
Strassner, John.
ScienceDirect http://www.sciencedirect.com/science/book/9781558608597
Format:
Alıntı:
Policy-based network management : solutions for the next generation / Strassner, John.
by
Babbin, Jacob.
Format:
Alıntı:
Security log management identifying patterns in the chaos / Babbin, Jacob.
by
Field, Alan, author.
Format:
Alıntı:
ISO 37001 : an introduction to anti-bribery management systems : doing the right things / Field
by
Wheeler, Evan.
Format:
Alıntı:
Security risk management building an information security risk management program from the ground
by
Contos, Brian T.
Format:
Alıntı:
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management
by
Kumar, Atul.
Format:
Alıntı:
Management: installation, configuration, and day-to-day tasks / Kumar, Atul.
by
Ganci, John.
Format:
Alıntı:
Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5
by
Babbin, Jacob.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490429
Format:
Alıntı:
Security log management : identifying patterns in the chaos / Babbin, Jacob.
by
Contos, Brian T.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491297
Format:
Alıntı:
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management
by
Ginodman, Veniamin, editor.
Format:
Alıntı:
Information Management & Computer Security,
by
Kane, Greg.
Format:
Alıntı:
Security Executive Council risk management portfolio
by
Guerrier, Claudine, author.
Format:
Alıntı:
Innovation, Entrepreneurship, Management Series : Innovation and Technology Set
by
Moschovitis, Christos J. P., author.
Format:
Alıntı:
Information technology -- Management.
by
Hellmann, Roland, author.
Format:
Alıntı:
Information technology -- Management.
by
Hsu, Tony, author.
Format:
Alıntı:
Information technology -- Management.
by
Vacca, John R.
Format:
Alıntı:
Computer security -- Management.
by
Danielyan, Edgar.
Format:
Alıntı:
Computer networks -- Management.
by
Collins, Jon, author.
Format:
Alıntı:
Computer security -- Management.
by
Osborne, Mark.
Format:
Alıntı:
Computer security -- Management.
by
DeLuccia, James J., 1977-
Format:
Alıntı:
Information technology -- Management.
by
Allen, Lee, 1946- author.
Format:
Alıntı:
Computer security -- Management.
by
Andress, Jason, author.
Format:
Alıntı:
Information resources management.
by
Edwards, Matthew, editor of compilation.
Format:
Alıntı:
Emergency management.
by
Andress, Jason.
ScienceDirect http://www.sciencedirect.com/science/book/9781597496537
Format:
Alıntı:
Information resources management.
by
Andress, Jason.
ScienceDirect https://www.sciencedirect.com/science/book/9781597496537
Format:
Alıntı:
Information resources management.
by
Snedaker, Susan.
Format:
Alıntı:
Management information systems -- Security measures.
by
Rittinghouse, John W.
ScienceDirect http://www.sciencedirect.com/science/book/9781555583392
Format:
Alıntı:
Information resources management.
by
Knipp, Eric.
ScienceDirect https://www.sciencedirect.com/science/book/9781931836562
Format:
Alıntı:
Computer networks -- Management.
by
Harley, David.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491648
Format:
Alıntı:
Computer security -- Management.
by
Canavan, Tom.
Format:
Alıntı:
Provides information on maintaining security for websites built on open source Content Management
by
Bendell, Dan.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492508
Format:
Alıntı:
SonicWALL -- Enterprise SonicWALL management.
by
Beyah, Raheem (Raheem A.), 1976-
Format:
Alıntı:
management and configuration.
by
Dwivedi, Himanshu.
Format:
Alıntı:
. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port
by
Burton, James.
ScienceDirect http://www.sciencedirect.com/science/book/9781932266696
Format:
Alıntı:
device management; IDS Anti-Evasion Techniques.
by
Williams, Branden R.
Format:
Alıntı:
-- Vulnerability management -- Logging events and monitoring the cardholder data environment -- PCI for the small
by
Wotring, Brian.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490184
Format:
Alıntı:
This book is about one of the most crucial aspects of system and security management: host
by
Rash, Michael.
ScienceDirect http://www.sciencedirect.com/science/book/9781932266474
Format:
Alıntı:
are going to be approaching management for funding in the next year or two to procure intrusion
by
Rittinghouse, John W.
ScienceDirect http://www.sciencedirect.com/science/book/9781555583170
ScienceDirect https://www.sciencedirect.com/science/book/9781555583170
ScienceDirect https://www.sciencedirect.com/science/book/9781555583170
Format:
Alıntı:
management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very
by
Andrés, Steven.
ScienceDirect https://www.sciencedirect.com/science/book/9781931836012
Format:
Alıntı:
Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing
by
Speed, Tyler Justin.
Format:
Alıntı:
reviews key topics surrounding computer security--including privacy, access controls, and risk management
by
Amini, Rob.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492430
Format:
Alıntı:
public key infrastructure -- Securing the network management process -- Securing network services and
by
Behrens, Thorsten.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490047
Format:
Alıntı:
, Intrusion Detection, and Attack Management; Services; Configuring Authentication, Authorization and
by
Stephens, Robert.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490313
Format:
Alıntı:
: SecurePlatform 11: Management High Availability & Failover 12: Integration and configuration of CVP / UFP 13
by
Behrens, Thorsten.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490047
Format:
Alıntı:
, Intrusion Detection, and Attack Management; Services; Configuring Authentication, Authorization and
by
Wall, David.
ScienceDirect https://www.sciencedirect.com/science/book/9781932266917
Format:
Alıntı:
responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It
by
Rittinghouse, John W.
ScienceDirect https://www.sciencedirect.com/science/book/9781555583064
Format:
Alıntı:
operational security, asset protection, integrity management, availability methodology, incident response and
by
Kenyon, Tony, 1960-
ScienceDirect http://www.sciencedirect.com/science/book/9781555582715
Format:
Alıntı:
challenging problems in network design and management. He provides clear, specific solutions for day
by
Chuvakin, Anton.
ScienceDirect http://www.sciencedirect.com/science/book/9781597494991
Format:
Alıntı:
-- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events
by
Wilhelm, Thomas.
ScienceDirect https://www.sciencedirect.com/science/book/9781597494250
Format:
Alıntı:
Master project management skills necessary for running a formal penetration test and setting up a
by
Wayner, Peter, 1964-
ScienceDirect https://www.sciencedirect.com/science/book/9780123744791
Format:
Alıntı:
also central to digital rights management (DRM), a group of techniques for technologically controlling
by
Qian, Yi, 1962-
ScienceDirect https://www.sciencedirect.com/science/book/9780123735669
Format:
Alıntı:
itemizing failsafe design features such as alarms, restoration protocols, and management configurations to
by
Varsalone, Jesse.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492447
Format:
Alıntı:
your Data -- Part IV: Forefront Server Security Management Console -- Chapter 10: Introduction to the
by
Bradley, Tony, 1969-
ScienceDirect http://www.sciencedirect.com/science/book/9781597491655
Format:
Alıntı:
. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance
by
Wiles, Jack.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492232
Format:
Alıntı:
& Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to
by
Manzuik, Steve.
ScienceDirect http://www.sciencedirect.com/science/book/9781597491013
Format:
Alıntı:
management and technical skill and tools required to develop an effective vulnerability management system
by
Harrington, Jan L.
ScienceDirect https://www.sciencedirect.com/science/book/9780123116338
Format:
Alıntı:
security policies, user management, and control of services and devices. + Covers techniques for enhancing
by
Cheah, Chun Hai.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836258
Format:
Alıntı:
essential IIS 6.0 features. The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that
by
Hunter, Laura E.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836814
Format:
Alıntı:
of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these
by
Stefanek, George L.
ScienceDirect https://www.sciencedirect.com/science/book/9781878707963
Format:
Alıntı:
And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
by
Vacca, John R.
ScienceDirect https://www.sciencedirect.com/science/book/9780123743541
Format:
Alıntı:
technology security management / Identity management / Intrusion prevention and detection systems / Computer
by
Maynor, David.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490566
Format:
Alıntı:
networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg
by
Seagren, Eric.
ScienceDirect http://www.sciencedirect.com/science/book/9781597491235
Format:
Alıntı:
Process -- Introduction -- Patch Management -- Change Management -- Antivirus -- Antispyware -- Intrusion
by
Birkholz, Erik Pace.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836692
Format:
Alıntı:
management; however technical managers can use the book to help them understand the challenges faced by the
by
Posey, Brien.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492850
Format:
Alıntı:
-- Defining protection policies -- Advanced security configurations -- End point management -- Monitoring
by
Wiles, Jack.
ScienceDirect http://www.sciencedirect.com/science/book/9781597491389
Format:
Alıntı:
Management: Performing a Mini Risk Assessment -- Outsider-Insider Threats -- The Mind of a Social Engineer
by
Burnett, Mark (Mark M.)
ScienceDirect http://www.sciencedirect.com/science/book/9781932266658
Format:
Alıntı:
; ; Maintaining State; ; Using ASP.NET Tokens; ; Enhancing ASP.NET State Management; ; Code Audit Fast Track
Eylem Seç