Search ResultsElektronik Kaynaklar ![](/client/images/blank.gif)
by
Dalziel, Henry, author.
Format:
Alıntı:
Infosec management fundamentals / Dalziel, Henry, author.
by
Tiller, James S.
Format:
Alıntı:
Adaptive security management architecture Tiller, James S.
by
Abbadi, Imad M., author.
Format:
Alıntı:
Cloud management and security / Abbadi, Imad M., author.
by
Bertino, Elisa.
Format:
Alıntı:
Identity management concepts, technologies, and systems / Bertino, Elisa.
by
Boulanger, Jean-Louis.
Format:
Alıntı:
Safety management for software-based equipment Boulanger, Jean-Louis.
by
Willson, David, author.
Format:
Alıntı:
Cyber security awareness for CEOs and management / Willson, David, author.
by
Zeng, Wenjun, 1967-
Format:
Alıntı:
Multimedia security technologies for digital rights management Zeng, Wenjun, 1967-
by
Zeng, Wenjun, 1967-
ScienceDirect http://www.sciencedirect.com/science/book/9780123694768
Format:
Alıntı:
Multimedia security technologies for digital rights management / Zeng, Wenjun, 1967-
by
ProQuest (Firm)
Format:
Alıntı:
Information management & computer security. Volume 15, Number 5, Papers from the HAISA 2007
by
Jones, Andy, 1952-
Format:
Alıntı:
Risk management for computer security Protecting your network and information assets / Jones, Andy
by
Calder, Alan, author.
Format:
Alıntı:
Information security risk management for ISO 27001/ISO 27002 / Calder, Alan, author.
by
Spasovski, Martin.
Format:
Alıntı:
OAuth 2.0 identity and access management patterns / Spasovski, Martin.
by
Wheeler, Evan.
Format:
Alıntı:
Security risk management building an information security risk management program from the ground
by
Contos, Brian T.
Format:
Alıntı:
Enemy at the water cooler real-life stories of insider threats and Enterprise Security Management
by
Chuvakin, Anton A.
Format:
Alıntı:
Logging and log management the authoritative guide to understanding the concepts surrounding
by
Kumar, Atul.
Format:
Alıntı:
Management: installation, configuration, and day-to-day tasks / Kumar, Atul.
by
Yagüe, Mariemma.
Format:
Alıntı:
management (EuDiRights) Yagüe, Mariemma.
by
Bücker, Axel.
Format:
Alıntı:
Federated identity management and web services security with IBM tivoli security solutions Bücker
by
Contos, Brian T.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491228
Format:
Alıntı:
Physical and logical security convergence powered by enterprise security management / Contos, Brian
by
Contos, Brian T.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491297
Format:
Alıntı:
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management
by
Dhillon, Gurpreet.
Format:
Alıntı:
Logistics information management ;
by
Ginodman, Veniamin, editor.
Format:
Alıntı:
Information Management & Computer Security,
by
Gritzalis, Stefanos.
Format:
Alıntı:
Information Management & Computer Security ;
by
Kane, Greg.
Format:
Alıntı:
Security Executive Council risk management portfolio
by
Lascu, Octavian.
Format:
Alıntı:
IBM Cluster systems management.
by
Guerrier, Claudine, author.
Format:
Alıntı:
Innovation, Entrepreneurship, Management Series : Innovation and Technology Set
by
Straub, Detmar W.
Format:
Alıntı:
Advances in management information systems.
by
Tyson, Dave.
Format:
Alıntı:
Risk management.
by
Mark, Talabis, author.
Format:
Alıntı:
Information resources management -- Security measures.
by
Young, Carl S., author.
Format:
Alıntı:
Risk management.
by
Messier, Ric, author.
Format:
Alıntı:
Information technology -- Management.
by
Moskowitz, Jeremy, author.
Format:
Alıntı:
Software configuration management.
by
Andress, Jason, author.
Format:
Alıntı:
Information resources management.
by
Moskowitz, Jeremy.
Format:
Alıntı:
Software configuration management.
by
Cross, Michael, 1965-
Format:
Alıntı:
Risk management -- Social aspects.
by
Moskowitz, Jeremy.
Format:
Alıntı:
Software configuration management.
by
Kleidermacher, David.
ScienceDirect http://www.sciencedirect.com/science/book/9780123868862
Format:
Alıntı:
COMPUTERS -- Software Development & Engineering -- Project Management.
by
Andress, Jason.
ScienceDirect http://www.sciencedirect.com/science/book/9781597496537
Format:
Alıntı:
Information resources management.
by
Andress, Jason.
ScienceDirect https://www.sciencedirect.com/science/book/9781597496537
Format:
Alıntı:
Information resources management.
by
Kahn, Miriam (Miriam B.)
Format:
Alıntı:
Emergency management -- Planning.
by
Thames, Lane. editor.
Format:
Alıntı:
Innovation/Technology Management.
by
Tyson, Dave.
Format:
Alıntı:
Risk management.
by
Carroll, John M. (John Millar), 1925-
ScienceDirect https://www.sciencedirect.com/science/book/9780409900323
Format:
Alıntı:
BUSINESS & ECONOMICS -- Industrial Management.
by
Konheim, Alan G., 1934-
Format:
Alıntı:
pt. 1. Mathematical preliminaries -- pt. 2. Hashing for storage : data management -- pt. 3. Some
by
Burton, James.
ScienceDirect http://www.sciencedirect.com/science/book/9781932266696
Format:
Alıntı:
device management; IDS Anti-Evasion Techniques.
by
Vishwakarma, H.R . editor.
Format:
Alıntı:
-centered services and systems and mobile data management. The novel and recent technologies presented in the book
by
Mao, Wenji.
ScienceDirect http://www.sciencedirect.com/science/book/9780123972002
Format:
Alıntı:
Analysis and Parallel Management -- 4. Modeling Organizational Behavior in Artificial Society -- 5. Data
by
Wotring, Brian.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490184
Format:
Alıntı:
This book is about one of the most crucial aspects of system and security management: host
by
Rash, Michael.
ScienceDirect http://www.sciencedirect.com/science/book/9781932266474
Format:
Alıntı:
are going to be approaching management for funding in the next year or two to procure intrusion
by
Rittinghouse, John W.
ScienceDirect http://www.sciencedirect.com/science/book/9781555583170
ScienceDirect https://www.sciencedirect.com/science/book/9781555583170
ScienceDirect https://www.sciencedirect.com/science/book/9781555583170
Format:
Alıntı:
management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very
by
Traoré, Issa. editor.
Format:
Alıntı:
presented in topics such as application security and threat management; modern authentication paradigms
by
Bonnell, Ralph.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492454
Format:
Alıntı:
for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of
by
Clercq, Jan de, 1968-
ScienceDirect https://www.sciencedirect.com/science/book/9781555583408
Format:
Alıntı:
management across security-related boundaries. R2 also improves branch office server management and increases
by
Kinney, Steven.
ScienceDirect http://www.sciencedirect.com/science/book/9780750679602
Format:
Alıntı:
migration and secret management suite -- The trusted device driver -- TPM system deployment initialization
by
Amini, Rob.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492430
Format:
Alıntı:
public key infrastructure -- Securing the network management process -- Securing network services and
by
Rittinghouse, John W.
ScienceDirect http://www.sciencedirect.com/science/book/9781555583385
Format:
Alıntı:
Management; IM Risk Management for Enterprise; The Business Value of IM; The Future of IM (contributed by
by
Rittinghouse, John W.
ScienceDirect https://www.sciencedirect.com/science/book/9781555583064
Format:
Alıntı:
operational security, asset protection, integrity management, availability methodology, incident response and
by
Alsmadi, Izzat M. editor.
Format:
Alıntı:
, unwanted traffic detection and control based on trust management software defined networks, security in
by
Chaki, Rituparna. editor.
Format:
Alıntı:
A Review on Energy Efficient Resource Management Strategies for Cloud -- Modeling and Analysis of
by
Sagers, Glen., author.
Format:
Alıntı:
management determining whether a strategic alliance with another firm which links their corporate information
by
Mullen, Timothy M.
ScienceDirect http://www.sciencedirect.com/science/book/9781597495721
Format:
Alıntı:
Management Gateway (TMG) -- Chapter 2. Internet Information Server (IIS) Authentication and Authorization
by
Mansourov, Nikolai.
ScienceDirect https://www.sciencedirect.com/science/book/9780123814142
Format:
Alıntı:
engineers tasked with system assurance, the book teaches you how to use the Object Management Group's (OMG
by
Qian, Yi, 1962-
ScienceDirect https://www.sciencedirect.com/science/book/9780123735669
Format:
Alıntı:
itemizing failsafe design features such as alarms, restoration protocols, and management configurations to
by
Varsalone, Jesse.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492447
Format:
Alıntı:
your Data -- Part IV: Forefront Server Security Management Console -- Chapter 10: Introduction to the
by
Wiles, Jack.
ScienceDirect http://www.sciencedirect.com/science/book/9781597492232
Format:
Alıntı:
& Information; Management through Electronic Discovery; Win or Lose -- You Choose! -- Inside Secrets to
by
Piccard, Paul L.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490177
ScienceDirect http://www.sciencedirect.com/science/book/9781597499965
ScienceDirect http://www.sciencedirect.com/science/book/9781597499965
Format:
Alıntı:
the management and security ramifications. These companies are now finding out the hard way that these
by
Hunter, Laura E.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836814
Format:
Alıntı:
of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these
by
Stefanek, George L.
ScienceDirect https://www.sciencedirect.com/science/book/9781878707963
Format:
Alıntı:
And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
by
Zelkowitz, Marvin V., 1945-
ScienceDirect http://www.sciencedirect.com/science/book/9780123855107
Format:
Alıntı:
; 9. Inadequate Credential Management Procedures; 10. Strategies for Defeating Identity Thieves; 11
ScienceDirect https://www.sciencedirect.com/science/book/9781597492805
Format:
Alıntı:
, centralized server role management, and an improved file system. * Outlines steps for installing only the
by
Winkler, Ira.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491686
Format:
Alıntı:
Security; Chapter 11. Is Security a Should or a Must?; Management Must Believe Security is a Must; So is
by
Maynor, David.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490566
Format:
Alıntı:
networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg
by
Clercq, Jan de, 1968-
ScienceDirect http://www.sciencedirect.com/science/book/9781555582838
Format:
Alıntı:
-related concepts -- 8.4 Windows and UNIX account management and authentication integration approaches -- 8.5
by
Leeuw, Karl de.
ScienceDirect http://www.sciencedirect.com/science/book/9780444516084
Format:
Alıntı:
. Semiotics of Identity Management (P. Wisse) -- 8. History of Document Security (K.J. Schell) -- 9. From
by
Wiles, Jack.
ScienceDirect http://www.sciencedirect.com/science/book/9781597491389
Format:
Alıntı:
Management: Performing a Mini Risk Assessment -- Outsider-Insider Threats -- The Mind of a Social Engineer
by
Satapathy, Suresh Chandra. editor.
Format:
Alıntı:
-Organization Wireless Sensor Network for Traffic Management in Smart Cities -- Chapter 68. Inter Area Frequency
by
Satapathy, Suresh Chandra. editor.
Format:
Alıntı:
Authentication -- Chapter 72. ICT enabled proposed solutions for Soil Fertility Management in Indian Agriculture
![](/client/images/blank.gif)
Eylem Seç