![Managing Risk and Security in Outsourcing IT Services Managing Risk and Security in Outsourcing IT Services](https://bilder.buecher.de/produkte/57/57733/57733356m.jpg)
Broschiertes Buch
Onshore, Offshore and the Cloud
5. September 2019
CRC Press
Gebundenes Buch | 87,99 € |
![Managing Risk and Security in Outsourcing IT Services Managing Risk and Security in Outsourcing IT Services](https://bilder.buecher.de/produkte/33/33456/33456926m.jpg)
Gebundenes Buch
Onshore, Offshore and the Cloud
9. Dezember 2013
CRC Press
![Visionen menschlicher Zukunft Visionen menschlicher Zukunft](https://bilder.buecher.de/produkte/25/25165/25165950m.jpg)
Ähnliche Artikel
![Information Security Policies, Procedures, and Standards Information Security Policies, Procedures, and Standards](https://bilder.buecher.de/produkte/21/21644/21644942m.jpg)
Broschiertes Buch
Guidelines for Effective Information Security Management
20. Dezember 2001
CRC Press
![Cyber Security Essentials Cyber Security Essentials](https://bilder.buecher.de/produkte/30/30426/30426898m.jpg)
![Adaptive Security Management Architecture Adaptive Security Management Architecture](https://bilder.buecher.de/produkte/58/58413/58413412m.jpg)
![Building an Effective Information Security Policy Architecture Building an Effective Information Security Policy Architecture](https://bilder.buecher.de/produkte/57/57814/57814612m.jpg)
Broschiertes Buch
19. September 2019
CRC Press
![Strategic Security Strategic Security](https://bilder.buecher.de/produkte/61/61210/61210908m.jpg)
![The Ethical Hack The Ethical Hack](https://bilder.buecher.de/produkte/58/58053/58053711m.jpg)
Broschiertes Buch
A Framework for Business Value Penetration Testing
23. Oktober 2019
CRC Press
![FISMA Principles and Best Practices FISMA Principles and Best Practices](https://bilder.buecher.de/produkte/58/58053/58053026m.jpg)
![Insider Computer Fraud Insider Computer Fraud](https://bilder.buecher.de/produkte/57/57816/57816829m.jpg)
Broschiertes Buch
An In-depth Framework for Detecting and Defending against Insider IT Attacks
19. September 2019
CRC Press
![Information Assurance Architecture Information Assurance Architecture](https://bilder.buecher.de/produkte/57/57815/57815690m.jpg)
![Practical Hacking Techniques and Countermeasures Practical Hacking Techniques and Countermeasures](https://bilder.buecher.de/produkte/21/21150/21150196m.jpg)
Ähnlichkeitssuche: Fact®Finder von OMIKRON