Search alternatives:
integrated services » internet services
chains integrated » china integrated, change integrated, gain integrated
security systems » security system
layer security » water security, cyber security
supply chains » supply chain
supply layer » supply case, supply based, supply latin
integrated services » internet services
chains integrated » china integrated, change integrated, gain integrated
security systems » security system
layer security » water security, cyber security
supply chains » supply chain
supply layer » supply case, supply based, supply latin
1
2
by Yeluri, Raghuram.
Published 2014
Format:
Published 2014
Table of Contents: “... Evolution: From Stovepipes to Service Networks -- The Cloud as the New Way of Doing IT -- Security as a...”
Click to View
3
by Cheruvu, Sunil.
Published 2019
Format:
Published 2019
Table of Contents: “... -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law...”
Click to View
4
by Futral, William.
Published 2013
Format:
Published 2013
Table of Contents: “... -- Reporting and Logging -- Enablement at the Security Applications Layer -- Chapter 7: Creating a More Secure...”
Click to View
5
by Köhn, Doris.
Published 2014
Format:
Published 2014
Table of Contents: “... Microfinance Best Practices -- 2.3 Value Chain Financing, Borrowing from Private Sector Financial Services...”
Click to View