UM Logo

Your search returned 3 results.

Sort
Results
1.
Forrester's 2011 security strategy recommendations: how to take a more systematic approach to governance and data protection even as the computing landscape continues to change/ Khalid Kark. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Philippines: Schneider Electric, ©2010-2011
Availability: Items available for reference: UM Digos College - LIC: Not for loan (1)Call number: DPer 004.1105 C73 Sept 2010 - April 2011 v. 20 n. 3-9.

2.
After RSA breach, securID tokens in jeopardy?/ hackers may be able to remotely log into enterprise networks after a breach at RSA/ Jeremy Kirk. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Philippines: Schneider Electric, ©2010-2011
Availability: Items available for reference: UM Digos College - LIC: Not for loan (1)Call number: DPer 004.1105 C73 Sept 2010 - April 2011 v. 20 n. 3-9.

3.
4 virtualization security basics to watch/ Kevin Fogarty. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Philippines: Schneider Electric, ©2010-2011
Availability: Items available for reference: UM Digos College - LIC: Not for loan (1)Call number: DPer 004.1105 C73 Sept 2010 - April 2011 v. 20 n. 3-9.

Pages