Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Whether you are a manager, engineer, or IT security specialist, this authoritative resource shows you how to define and deploy roles for securing enterprise systems.
Information resources management. --- Computer networks --- Computer network architectures. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Corporations --- Information resource management --- Information systems management --- IRM (Information resources management) --- Management information systems --- Access control. --- Communication systems --- Data sovereignty
Listing 1 - 1 of 1 |
Sort by
|