Identity and Access Management: CISSP, #5E-bookIdentity and Access Management: CISSP, #5diSelwyn ClassenValutazione: 0 su 5 stelle0 valutazioniSalva Identity and Access Management: CISSP, #5 per dopo
Risk Management and Information Systems ControlE-bookRisk Management and Information Systems ControldiSelwyn ClassenValutazione: 5 su 5 stelle5/5Salva Risk Management and Information Systems Control per dopo
Scrum Master Fundamentals - Foundations: Scrum Master Fundamentals, #1E-bookScrum Master Fundamentals - Foundations: Scrum Master Fundamentals, #1diSelwyn ClassenValutazione: 0 su 5 stelle0 valutazioniSalva Scrum Master Fundamentals - Foundations: Scrum Master Fundamentals, #1 per dopo
Scrum Master Fundamentals - Growing Yourself and Your Team: Scrum Master Fundamentals, #2E-bookScrum Master Fundamentals - Growing Yourself and Your Team: Scrum Master Fundamentals, #2diSelwyn ClassenValutazione: 0 su 5 stelle0 valutazioniSalva Scrum Master Fundamentals - Growing Yourself and Your Team: Scrum Master Fundamentals, #2 per dopo
Security and Risk Management: CISSP, #1E-bookSecurity and Risk Management: CISSP, #1diSelwyn ClassenValutazione: 4 su 5 stelle4/5Salva Security and Risk Management: CISSP, #1 per dopo
Incident ManagementE-bookIncident ManagementdiSelwyn ClassenValutazione: 0 su 5 stelle0 valutazioniSalva Incident Management per dopo
Security Assessment and Testing: CISSP, #6E-bookSecurity Assessment and Testing: CISSP, #6diSelwyn ClassenValutazione: 2 su 5 stelle2/5Salva Security Assessment and Testing: CISSP, #6 per dopo
Security Operations: CISSP, #7E-bookSecurity Operations: CISSP, #7diSelwyn ClassenValutazione: 0 su 5 stelle0 valutazioniSalva Security Operations: CISSP, #7 per dopo
IS Auditor - Process of Auditing: Information Systems Auditor, #1E-bookIS Auditor - Process of Auditing: Information Systems Auditor, #1diSelwyn ClassenValutazione: 0 su 5 stelle0 valutazioniSalva IS Auditor - Process of Auditing: Information Systems Auditor, #1 per dopo
Security Engineering: CISSP, #3E-bookSecurity Engineering: CISSP, #3diSelwyn ClassenValutazione: 0 su 5 stelle0 valutazioniSalva Security Engineering: CISSP, #3 per dopo