Search Results - Security information management
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 76
- Security measures 70
- Management 54
- Computer networks 48
- Information technology 41
- Data protection 37
- Management information systems 17
- Information resources management 14
- Libraries 14
- Business enterprises 12
- Data processing 12
- Database management 12
- Computers 10
- Electronic commerce 10
- Access control 9
- Safety measures 9
- Business 7
- Design 7
- Risk management 7
- Business intelligence 6
- Electronic data processing departments 6
- Emergency management 6
- Internet 6
- Planning 6
- Computer crimes 5
- Conservation and restoration 5
- Database design 5
- Electronic information resources 5
- Examinations 5
- Finance 5
-
221
CompTIA A+ guide to IT technical support
Published 2020Click Here to View Status and Holdings.
Book -
222
-
223
Master visually Microsoft Windows Vista
Published 2007Table of Contents: “…Setting up Windows Vista -- Preparing installation -- Installing Windows Vista -- Customizing and updating Windows Vista -- Pt 2. Managing the desktop environment -- Using the Windows Vista interface -- Customizing the desktop -- Managing users -- Managing files and folders -- Managing security -- Pt. 3. …”
Click Here to View Status and Holdings.
Unknown -
224
DEMONSTRATING RESULTS Using Outcome Measurement In Your Library
Published 2006Click Here to View Status and Holdings.
Conference Proceeding Book -
225
-
226
Data Communications And Computer Networks
Published 2004Click Here to View Status and Holdings.
Book -
227
-
228
Data Communications and Networking
Published 2013Table of Contents: “…Network models -- Introduction to physical layer -- Digital transmission -- Analog transmission -- Bandwidth utilization : Multiplexing and spectrum spreading -- Transmission media -- Introduction to data-link layer -- Error detection and correction -- Data Link Control (DLC) -- Media Access Control (MAC) -- Wired LANs : Ethernet -- Other wired networks -- Connecting devices and virtual LANs -- Introduction to network layer -- Network-layer protocols -- Unicast routing -- Multicast routing -- Next generation IP -- Introduction to transport layer -- Transport-layer protocols -- Introduction to application layer -- Standard client-server protocols -- Network management -- Multimedia -- Peer-to-peer paradigm -- Quality of service -- Cryptography and network security -- Internet security. …”
Click Here to View Status and Holdings.
Manuscript Book -
229
-
230
-
231
New perspectives on computer concepts 2014, introductory
Published 2014Click Here to View Status and Holdings.
Unknown -
232
New perspectives on computer concepts 2014, comprehensive
Published 2014Click Here to View Status and Holdings.
Unknown -
233
-
234
-
235
-
236
-
237
-
238
-
239
-
240