Books on the topic 'Centres de traitement informatique – Environnement'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 books for your research on the topic 'Centres de traitement informatique – Environnement.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Peltier, Thomas R. Policies & procedures for data security: A complete manual for computer systems and networks. San Francisco: Miller Freeman Inc., 1991.
Find full textThe art of managing software development people. New York: Wiley, 1985.
Find full textIFIP TC11 International Conference on Information Security (11th 1995 Cape Town, South Africa). Information security-the next decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95. London: Chapman & Hall on behalf of the IFIP, 1995.
Find full textMinoli, Daniel. Analyzing outsourcing: Reengineering information and communication systems. New York: Mcgraw-Hill, 1995.
Find full textF, Blanding Steven, ed. Enterprise operations management handbook. 2nd ed. Boca Raton, Fla: Auerbach, 2000.
Find full textEarly Edition Corporate Computer and Network Security. Prentice Hall, 2002.
Find full textGentile, Michael, Ron Collette, and Thomas D. August. CISO Handbook: A Practical Guide to Securing Your Company. Auerbach Publishers, Incorporated, 2016.
Find full textGentile, Michael, Ron Collette, and Thomas D. August. Ciso Handbook. Taylor & Francis Group, 2005.
Find full textThe Ciso Handbook: A Practical Guide to Securing Your Company. AUERBACH, 2005.
Find full textChoosing and Keeping Computer Staff: Recruitment, Selection and Development of Computer Personnel. Taylor & Francis Group, 2017.
Find full textChandor, Anthony. Choosing and Keeping Computer Staff: Recruitment, Selection and Development of Computer Personnel. Taylor & Francis Group, 2018.
Find full textChandor, Anthony. Choosing and Keeping Computer Staff: Recruitment, Selection and Development of Computer Personnel. Taylor & Francis Group, 2017.
Find full textKairab, Sudhanshu. Practical Guide to Security Assessments. Auerbach Publishers, Incorporated, 2004.
Find full textKairab, Sudhanshu. Practical Guide to Security Assessments. Auerbach Publishers, Incorporated, 2004.
Find full textKairab, Sudhanshu. Practical Guide to Security Assessments. Auerbach Publishers, Incorporated, 2004.
Find full textKairab, Sudhanshu. Practical Guide to Security Assessments. Taylor & Francis Group, 2019.
Find full textMinoli, Daniel. Analyzing Outsourcing: Reengineering Information and Communication Systems. McGraw-Hill Companies, 1994.
Find full textJan H.P. Eloff (Editor) and Sebastian von Solms (Editor), eds. Information Security - the Next Decade (IFIP International Federation for Information Processing). Springer, 1995.
Find full textMinoli, Daniel. Analyzing Outsourcing: Reengineering Information and Communication Systems. McGraw-Hill Companies, 1994.
Find full text