Administration: Configuration and Security اشترى العملاء أيضًا

The Myth of the Secure OS The Myth of the Secure OS
٢٠١٢
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
٢٠١٢
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
٢٠١٢
Network Centric Warfare Network Centric Warfare
١٩٩٩
Information Security Management - ITP 370 Information Security Management - ITP 370
٢٠١٤
The State of Risk-Based Security Management The State of Risk-Based Security Management
٢٠١٢
Security Vs. Convenience Security Vs. Convenience
٢٠١٢
Protecting Virtual Datacenters Protecting Virtual Datacenters
٢٠١٢
Cyber-Terrorism Cyber-Terrorism
٢٠١٤
Software Security For You Software Security For You
٢٠١٥
Hacked?! Hacked?!
٢٠١٥
Microsoft System Center Microsoft System Center
٢٠١٣
Microsoft System Center Software Update Management Field Experience Microsoft System Center Software Update Management Field Experience
٢٠١٥
Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability
٢٠١٢
High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows
٢٠١٢