BOOKS - NETWORK TECHNOLOGIES - Database Security
Database Security - Basta A., Zgola M. 2012 PDF Cengage Learning BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
1275

Telegram
 
Database Security
Author: Basta A., Zgola M.
Year: 2012
Pages: 322
Format: PDF
File size: 11 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Bad Deal (A-List Security #3)
Vanished (McIntyre Security Bodyguard #15)
Hard Job (A-List Security #2)
Security in Network Functions Virtualization
Public Security in Federal Polities
Cloud Security: Techniques and Applications
Desperate Girls (Wolfe Security, #1)
His to Protect (Elite Force Security, #2)
The Line of Duty (Blackhawk Security #6)
The Modern Security Operations Center
Westin (Sphinx Security Book 1)
Haunted (Harper Security Ops, #4)
Security and Privacy in the Internet of Things
Admin Network & Security
Cryptography and Embedded Systems Security
Undiscovered (Treasure Hunter Security, #1)
Vulnerable (McIntyre Security Bodyguard, #1)
The Oppenheimer Case: Security On Trial
Claiming Sarah (Ace Security, #5)
The Criminal (Miami Private Security #2)
Cabin 1 (Steele Shadows Security #1)
Business Data Networks and Security
Night Moves (Nighthawk Security #4)
101 Labs CompTIA Security+
Sleight of Hand (Blackbridge Security, #7)
Donovan (Gray Wolf Security, #1)
Uncharted (Treasure Hunter Security, #2)
Redeemed (McIntyre Security Bodyguard, #8)
Admin Network & Security
European Security & Defence
Shot in the Dark (Blackbridge Security, #2)
David (Gray Wolf Security, #2)
Illicit Intent (Bishop Security, #2)
Practical Paranoia OS X 10.11 Security Essentials
Dead of Night (Shadow Security #1)
Claiming Grace (Ace Security, #1)
Android Security Attacks and Defenses
Swallow, Girl (Knoxley Security, #1)
Recoverability As a First-Class Security Objective
The Hidden Potential of DNS In Security