Результаты поиска - ((un security) OR (_ security)) system
Dewey Classification внутри своего поиска.
Dewey Classification внутри своего поиска.
Предлагаемые темы внутри своего поиска.
Предлагаемые темы внутри своего поиска.
- Database management 8
- Electronic commerce 8
- Computer networks 7
- Information technology 6
- Electronic data processing 5
- Management information systems 5
- Trade regulation 5
- Computers 4
- Financial institutions 4
- Business enterprises 3
- Commercial law 3
- Computer Communication Networks 3
- Computer security 3
- Database design 3
- Finance, Public 3
- Industrial laws and legislation 3
- Physical distribution of goods 3
- Accounting 2
- Business 2
- Business enterprises--Computer networks 2
- Business ethics 2
- Business logistics 2
- Computer Security 2
- Computer science 2
- Data transmission systems 2
- Developmental psychology 2
- Economic history 2
- Electronic data interchange 2
- Financial markets 2
- Financial services 2
Альтернативы поиска:
- un security »
-
1
-
2
-
3
Climate change, food security, and diarrhoea prevalence nexus in Tanzania
Опубликовано 2024Полный текст
Полный текст
Статья -
4
Climate change, food security, and diarrhoea prevalence nexus in Tanzania
Опубликовано 2024Полный текст
Полный текст
Статья -
5
-
6
-
7
-
8
-
9
-
10
Constraints facing African academic libraries in applying electronic security systems to protect library materials
Опубликовано 2024Предметы: “...Electronic security system...”
Полный текст
Полный текст
Статья -
11
Constraints facing African academic libraries in applying electronic security systems to protect library materials
Опубликовано 2024Предметы: “...Electronic security system...”
Полный текст
Полный текст
Статья -
12
-
13
-
14
International maritime security law /
Опубликовано 2013Оглавление: “...Introduction to maritime security law American maritime security policy and strategy European maritime strategy and policy Peacetime zones and control measures Marine environmental protection and control measures U.S. safety and security zones and airspace control measures Sea power, grand strategy, and freedom of the seas Freedom of navigation in the law of the sea Excessive maritime claims : territorial seas, straits, and archipelagos Security claims in the Exclusive Economic Zone Flashpoint : South China Sea Securing the marine transportation system Port and port facility security Ship and ship operator security Global authorities to counter drug trafficking Regional authorities to counter drug trafficking U.S. maritime counterdrug law U.S. international maritime counterdrug policy Migrant smuggling at sea Maritime piracy and armed robbery at sea Maritime terrorism and weapons of mass destruction at sea Commentary for the Convention on the Suppression of Unlawful Acts against the Safety of Maritime Navigation Irregular naval warfare and blockade Security Council maritime enforcement...”
-
15
Common security and civil society in Africa /
Опубликовано 2000Оглавление: “...Beyond the war of images : towards common security and new partnership with Africa / Samantha Gibson Shifting commitments and national cohesion in African countries / Thandika Mkandawire Poverty, inequality and security in South Africa / Stephan Klasen and Fani Zulu Health and security in Sub-Saharan Africa / William Pick Meeting the goals of the 1990 World Summit on Children : health and nutritional status of children in Sub-Saharan Africa / Omar B. ...”
-
16
Information systems : foundation of e-business
Опубликовано 2002Оглавление: “...Moving Toward e-Business as Usual. 2. Understanding Systems from a Business Viewpoint. 3. Business Processes. 4. ...”
-
17
-
18
Database systems : introduction to databases and data warehouses /
Опубликовано 2014Оглавление: “...Note continued: Data Warehouse/Data Mart Front-End (BI) Applications Executive Dashboard Data Warehouse Deployment A Note About OLAP/BI Tools Database Models A Note About OLAP/BI Tools Data Architecture Options MOLAP ROLAP HOLAP Key Terms Review Questions Exercises ch. 10 Overview Of DBMS Functionalities And Database Administration Introduction DBMS Components Database Administration Overview Monitoring and Maintaining the Database System Data Dictionary Securing the Database Against Unauthorized Access Providing Database Backup and Recovery Ensuring Database Integrity Optimizing Database Performance Developing and Implementing Database Policies and Standards Key Terms Review Questions Appendix A Enhanced ER Appendix B Further Notes On Normalization And Higher Normal Forms Appendix C Enterprise Resource Planning (ERP) Appendix D Data Governance And Master Data Management. ...”
-
19
Security of mobile money transfer in telecommunication industry in Tanzania,
Опубликовано 2024Полный текст
Диссертация -
20
Security of mobile money transfer in telecommunication industry in Tanzania,
Опубликовано 2024Полный текст
Диссертация