Books on the topic 'Security Suite'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 books for your research on the topic 'Security Suite.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Designing an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.
Find full textGhébali, Victor Yves. Le bilan de la reunion de Vienne sur les suites de la CSCE. Geneva: GIPRI, 1989.
Find full textNational Workshop on Social Security Protection (1996 Pasig City, Manila, Philippines). Social security protection in the Philippines: Proceedings of the National Workshop on Social Security Protection, Manila Galleria Suites, Pasig City, Philippines, 30-31 July 1996. [Manila]: Institute for Labor Studies with technical assistance from the United Nations Development Programme and the International Labour Organisation, 1996.
Find full textOracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.
Find full textAbel, John. Oracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.
Find full textTeam, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.
Find full textTeam, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.
Find full text1972-, Ng Tinny, ed. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.
Find full text1972-, Ng Tinny, ed. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.
Find full text1972-, Ng Tinny, ed. Understanding IBM SOA foundation suite: Learning visually with examples. Indianapolis, Ind: IBM Press, 2009.
Find full textGilbert, Jeff, and Yuri Diogenes. Enterprise Mobility Suite - Managing BYOD and Company-Owned Devices. Pearson Education, 2015.
Find full textFriedberg, Robert D., and Micaela A. Thordarson. Suite Lessons: Pointers for Private Practitioners. Edited by Thomas H. Ollendick, Susan W. White, and Bradley A. White. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190634841.013.45.
Full textInformation Systems Audit and Control Association., ed. Security, audit and control features Oracle e-business suite: A technical and risk management reference guide. 2nd ed. Rolling Meadows, IL: ISACA, $c c2006., 2006.
Find full textSecurity, Audit & Control Features Oracle E-Business Suite: A Technical and Risk Management Reference Guide, 2nd Edition. Isaca, 2006.
Find full textL, Rukhin Andrew, and National Institute of Standards and Technology (U.S.), eds. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textL, Rukhin Andrew, and National Institute of Standards and Technology (U.S.), eds. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textL, Rukhin Andrew, and National Institute of Standards and Technology (U.S.), eds. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textRiley, Barry. The Search for Food Security. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190228873.003.0019.
Full textAmerican Law Institute-American Bar Association Committee on Continuing Legal Education., ed. Securing and enforcing patent rights, November 15-16, 1990, Washington, D.C.: ALI-ABA course of study materials. Philadelphia, Pa. (4025 Chestnut St., Philadelphia, 19104): American Law Institute-American Bar Association Committee on Continuing Professional Education, 1990.
Find full textColin, Bamford. 4 Personal and Property Rights. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198722113.003.0004.
Full textCollective enforcement of consumer law: Securing compliance in Europe through private group action and public authority intervention. Groningen: Europa Law Pub., 2007.
Find full text(Editor), Marco Loos, ed. Collective Enforcement of Consumer Law: Securing Compliance in Europe Through Private Group Action and Public Authority Intervention. Europa Law Pub Netherlands, 2007.
Find full textMeyers, Diana Tietjens. Victims of Trafficking, Reproductive Rights, and Asylum. Edited by Leslie Francis. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199981878.013.5.
Full textGrow, Nathaniel. An Aborted Trial. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038198.003.0007.
Full textGrare, Frédéric. India’s Look East Policy and Asian Institutional Architecture. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190859336.003.0009.
Full textMorgan, Patrick M. Nuclear Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.410.
Full textChristine, Gray. International Law and the Use of Force. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198808411.001.0001.
Full textSchandl, Heinz, and Iain Walker, eds. Social Science and Sustainability. CSIRO Publishing, 2017. http://dx.doi.org/10.1071/9781486306411.
Full textFlentø, Johnny, and Leonardo Santos Simao. Donor relations and sovereignty. UNU-WIDER, 2020. http://dx.doi.org/10.35188/unu-wider/2020/892-4.
Full text