Information technology -- Security techn
โฆ LIBER โฆ
๐
Information technology -- Application security -- Part 5-1: Protocols and application security controls data structure, XML schemas
- Leaves
- 84
- Edition
- 1
- Category
- Scientific
โฌ Acquire This Volume
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Information technology -- Security techn
Information technology -- Application se
Information Security Technologies for Co
โ Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Babak Akhgar (editor)
๐ Library
๐
2021
๐ Springer
๐ English
<p><span>The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lo
Information technology -- Security techn
Information technology -- Security techn