BOOKS - PROGRAMMING - Information Security Principles and Practices, 2nd Edition
Information Security Principles and Practices, 2nd Edition - Mark S. Merkow, Jim Breithaupt 2014 EPUB Pearson BOOKS PROGRAMMING
ECO~15 kg CO²

1 TON

Views
6962

Telegram
 
Information Security Principles and Practices, 2nd Edition
Author: Mark S. Merkow, Jim Breithaupt
Year: 2014
Pages: 368
Format: EPUB
File size: 10 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Security Analysis: Principles and Techniques [With CDROM]
Protecting Privacy in Data Release (Advances in Information Security Book 57)
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Cyber Defense and Situational Awareness (Advances in Information Security Book 62)
Cryptography Arithmetic: Algorithms and Hardware Architectures (Advances in Information Security)
Introduction to Machine Learning with Applications in Information Security 2nd Edition
Adversarial Multimedia Forensics (Advances in Information Security Book 104)
Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders
Offensive and Defensive Cyber Security Strategies Fundamentals, Theory and Practices
Cyber Security Standards, Practices and Industrial Applications Systems and Methodologies
Developing People|s Information Capabilities: Fostering Information Literacy in Educational, Workplace and Community Contexts (Library and Information Science, 8)
Computer Security Principles and Practice 5th Edition
Computer Security Principles and Practice, Global Edition
Computer Security Principles and Practice 5th Edition
Flexible Network Architectures Security Issues and Principles
Blockchains: A Handbook on Fundamentals, Platforms and Applications (Advances in Information Security 105)
Blockchain for Cybersecurity in Cyber-Physical Systems (Advances in Information Security, 102)
Teaching, Learning and Investigating Pragmatics: Principles, Methods and Practices by Francesca Bianchi, Winnie Cheng Sara Gesuato (2015-07-01)
Defensive Security Handbook Best Practices for Securing Infrastructure, 2nd Edition (Final)
Defensive Security Handbook Best Practices for Securing Infrastructure, 2nd Edition (Final)
Building Secure and Reliable Systems SRE and Security Best Practices (Early Release)
Security Operations Center - Analyst Guide SIEM Technology, Use Cases and Practices
Cryptography and Network Security Principles and Practice, 7th edition
Cryptography and Network Security Principles and Practice, Sixth Edition
Cryptography and Network Security Principles and Practice, 8th Edition
Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives
Personal Information Security & Systems Architecture Techniques for PII Management in a Business
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, and IT Standards
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
Sensor Network Methodologies for Smart Applications (Advances in Information Security, Privacy, and Ethics)
The State Secrets Privilege and Other Limits on Classified Information (American Political, Economic, and Security Issues)
Human Brain Theory Information-commutation Device of the Brain and Principles of Its Work and Modeling
Cyber Defense Mechanisms Security, Privacy, and Challenges (Artificial Intelligence (AI) Elementary to Advanced Practices)
Project Cost Management: Principles, Tools, Techniques, and Best Practices for Project Finance
On the Dual Uses of Science and Ethics: Principles, Practices, and Prospects (Practical Ethics and Public Policy)
Sugarcane Crop Logging and Crop Control: Principles and Practices
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications (Advances in Information Security, 68)