Search alternatives:
integration theories » integration theorems, integrationstheorie 2, integration theory
data integration » data integrity
security series » security services, security service, security systems
cyber security » water security
supply cyber » supply case, supply cote
integration theories » integration theorems, integrationstheorie 2, integration theory
data integration » data integrity
security series » security services, security service, security systems
cyber security » water security
supply cyber » supply case, supply cote
1
by Ndemo, Bitange.
Published 2023
Format:
Published 2023
Table of Contents: “... Convention on Cyber Security and Personal Data Protection 2014 (Malabo Convention) -- 4.2.2 Supplementary Act...”
Click to View
2
by Christen, Markus.
Published 2020
Format:
Published 2020
Table of Contents: “....3.3 Stages of an Intrusion -- 2.4 Threats and Solutions in Data Security -- 2.4.1 Unauthorised Disclosure...”
Click to View