for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Cyber Victimology provides a global socio-legal-victimological perspective on victimization online, written in clear, non-technical terms, and presents practical solutions for the problem.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference.
Bemærk: Kan ikke leveres før jul.
This book, written for practitioners in the field, provides tangible, cost effective, and thus pragmatic means to mitigate key risks while leveraging built-in cloud capabilities and overarching principles of effective system design.
Bemærk: Kan ikke leveres før jul.
Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of... Læs mere
Bemærk: Kan ikke leveres før jul.
Discusses the nature of computer misuse and the legal and non-legal responses to it. This book explores what is meant by the term 'computer misuse' and... Læs mere
Bemærk: Kan ikke leveres før jul.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.
Bemærk: Kan ikke leveres før jul.
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.