COMPUTERS S -- Security -- Networking. : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström
2012
1
COMPUTERS S -- Security -- Online Safety & Privacy. : Microsoft forefront identity manager 2010 R2 handbook : a complete handbook on FIM 2010 R2 covering both identity and certificate management / Kent Nordström
Congo-Kinshasa -- defence -- security. : Supporting SSR in the DRC between a rock and a hard place : an analysis of the donor approach to supporting security sector reform in the Democratic Republic of Congo / Henri Boshoff ..
Security consultants -- Canada. : Powers of private security personnel : search and seizure : a study paper / prepared for the Law Reform Commission of Canada ; by Philip C. Stenning and Clifford D. Shearing
Security consultants -- Law and legislation -- Canada. : Powers of private security personnel : search and seizure : a study paper / prepared for the Law Reform Commission of Canada ; by Philip C. Stenning and Clifford D. Shearing
Security consultants -- South Africa : Managing security information : incidents, threats and vulnerabilities : a practical approach for security practitioners serving private and government entities in South Africa / Doraval Govender
UN -- civil wars -- Security Council. : United Nations Security Council and civil war first insights from a new dataset / James Cockayne, Christoph Mikulaschek, and Chris Perry
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Electronic commerce -- Security -- Congresses : E-commerce and web technologies : 4th international conference, EC-Web 2003, Prague, Czech Republic, September 2003 proceedings / Kurt Bauknecht, A. Min Tjoa, Gerald Quirchmayr (eds.)
Security -- Great Britain : Domestic Counter-Terrorism in a Global World : Post-9/11 Institutional Structures and Cultures in Canada and the United Kingdom
Here are entered works on the right of human beings to be free from social and political violence, including environmental, economic, food, health, personal, and political threats