Administration: Configuration and Security 함께 구입한 다른 도서

The Myth of the Secure OS The Myth of the Secure OS
2012년
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012년
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
2012년
Network Centric Warfare Network Centric Warfare
1999년
Information Security Management - ITP 370 Information Security Management - ITP 370
2014년
The State of Risk-Based Security Management The State of Risk-Based Security Management
2012년
Security Vs. Convenience Security Vs. Convenience
2012년
Protecting Virtual Datacenters Protecting Virtual Datacenters
2012년
Cyber-Terrorism Cyber-Terrorism
2014년
Software Security For You Software Security For You
2015년
Hacked?! Hacked?!
2015년
Microsoft System Center Microsoft System Center
2013년
Microsoft System Center Software Update Management Field Experience Microsoft System Center Software Update Management Field Experience
2015년
Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability
2012년
High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows
2012년