Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force 함께 구입한 다른 도서

Network Centric Warfare Network Centric Warfare
1999년
Security Vs. Convenience Security Vs. Convenience
2012년
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012년
Administration: Configuration and Security Administration: Configuration and Security
2013년
Protecting Virtual Datacenters Protecting Virtual Datacenters
2012년
The State of Risk-Based Security Management The State of Risk-Based Security Management
2012년
The Myth of the Secure OS The Myth of the Secure OS
2012년
Anatomy of a Phish Anatomy of a Phish
2014년
Conflicts of Interest Conflicts of Interest
2012년
Software Security For You Software Security For You
2015년
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014년
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011년
Information Security Management - ITP 370 Information Security Management - ITP 370
2014년
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011년
High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows
2012년