-
SECURITY AND PRIVACY CONTROLS IN RFID SYSTEMS
4,271
博客來
-
MOBILE DEVICE SECURITY: THREATS AND CONTROLS
1,976
博客來
-
INFORMATION SECURITY: A GUIDE FOR IMPLEMENTING SECURITY CONTROLS ON INFORMATION ASSETS
2,749
博客來
-
RELATION BETWEEN CYBER INSURANCE AND SECURITY INVESTMENTS/CONTROLS
1,520
博客來
-
SECURITY CONTROLS EVALUATION, TESTING, AND ASSESSMENT HANDBOOK
4,497
博客來
-
SECURITY MANAGEMENT CONTROLS A COMPLETE GUIDE - 2020 EDITION
5,667
博客來
-
SILENCING SCIENCE: NATIONAL SECURITY CONTROLS AND SCIENTIFIC COMMUNICATION
4,200
博客來
-
SECURITY CONTROLS EVALUATION, TESTING, AND ASSESSMENT HANDBOOK
5,997
博客來
-
SILENCING SCIENCE: NATIONAL SECURITY CONTROLS & SCIENTIFIC COMMUNICATION
3,300
博客來
-
INFORMATION SECURITY CONTROLS A COMPLETE GUIDE - 2020 EDITION
5,667
博客來
-
PHYSICAL SECURITY CONTROLS A COMPLETE GUIDE - 2020 EDITION
5,667
博客來
-
ARMED FORCES AND SECURITY SERVICES: WHAT DEMOCRATIC CONTROLS?
4,200
博客來
-
INFORMATION SECURITY MANAGEMENT CONTROLS A COMPLETE GUIDE - 2020 EDITION
5,667
博客來
-
RISKS, CONTROLS, AND SECURITY: CONCEPTS AND APPLICATIONS
4,372
博客來
-
APPLIED CYBER SECURITY AND THE SMART GRID: IMPLEMENTING SECURITY CONTROLS INTO THE MODERN POWER INFRASTRUCTURE
3,597
博客來
-
AZURE SECURITY FOR CRITICAL WORKLOADS: IMPLEMENTING MODERN SECURITY CONTROLS FOR AUTHENTICATION, AUTHORIZATION AND AUDITING
1,710
博客來
-
EXPORTS CONTROLS: ARE WE PROTECTING SECURITY AND FACILITATING EXPORTS?
989
博客來
-
EXPORT CONTROLS: BALANCING U.S. COMPETITIVENESS WITH SECURITY
3,610
博客來
-
IT SECURITY CONTROLS: A GUIDE TO CORPORATE STANDARDS AND FRAMEWORKS
2,660
博客來
-
AUDITING INFORMATION AND CYBER SECURITY GOVERNANCE: A CONTROLS-BASED APPROACH
3,574
博客來