Libros sobre el tema "Centres de traitement informatique – Environnement"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 19 mejores mejores libros para su investigación sobre el tema "Centres de traitement informatique – Environnement".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Peltier, Thomas R. Policies & procedures for data security: A complete manual for computer systems and networks. San Francisco: Miller Freeman Inc., 1991.
Buscar texto completoThe art of managing software development people. New York: Wiley, 1985.
Buscar texto completoIFIP TC11 International Conference on Information Security (11th 1995 Cape Town, South Africa). Information security-the next decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95. London: Chapman & Hall on behalf of the IFIP, 1995.
Buscar texto completoMinoli, Daniel. Analyzing outsourcing: Reengineering information and communication systems. New York: Mcgraw-Hill, 1995.
Buscar texto completoF, Blanding Steven, ed. Enterprise operations management handbook. 2a ed. Boca Raton, Fla: Auerbach, 2000.
Buscar texto completoEarly Edition Corporate Computer and Network Security. Prentice Hall, 2002.
Buscar texto completoGentile, Michael, Ron Collette y Thomas D. August. CISO Handbook: A Practical Guide to Securing Your Company. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoGentile, Michael, Ron Collette y Thomas D. August. Ciso Handbook. Taylor & Francis Group, 2005.
Buscar texto completoThe Ciso Handbook: A Practical Guide to Securing Your Company. AUERBACH, 2005.
Buscar texto completoChoosing and Keeping Computer Staff: Recruitment, Selection and Development of Computer Personnel. Taylor & Francis Group, 2017.
Buscar texto completoChandor, Anthony. Choosing and Keeping Computer Staff: Recruitment, Selection and Development of Computer Personnel. Taylor & Francis Group, 2018.
Buscar texto completoChandor, Anthony. Choosing and Keeping Computer Staff: Recruitment, Selection and Development of Computer Personnel. Taylor & Francis Group, 2017.
Buscar texto completoKairab, Sudhanshu. Practical Guide to Security Assessments. Auerbach Publishers, Incorporated, 2004.
Buscar texto completoKairab, Sudhanshu. Practical Guide to Security Assessments. Auerbach Publishers, Incorporated, 2004.
Buscar texto completoKairab, Sudhanshu. Practical Guide to Security Assessments. Auerbach Publishers, Incorporated, 2004.
Buscar texto completoKairab, Sudhanshu. Practical Guide to Security Assessments. Taylor & Francis Group, 2019.
Buscar texto completoMinoli, Daniel. Analyzing Outsourcing: Reengineering Information and Communication Systems. McGraw-Hill Companies, 1994.
Buscar texto completoJan H.P. Eloff (Editor) y Sebastian von Solms (Editor), eds. Information Security - the Next Decade (IFIP International Federation for Information Processing). Springer, 1995.
Buscar texto completoMinoli, Daniel. Analyzing Outsourcing: Reengineering Information and Communication Systems. McGraw-Hill Companies, 1994.
Buscar texto completo