Search Results - "Stewart, James Michael"
-
1
De novo assembly of the transcriptome of Acanthaster planci testes
Published in Molecular ecology resources (01-07-2015)“…A key strategy to reduce coral loss is the development of effective control method for the corallivorous crown‐of‐thorns sea star (Acanthaster planci), an…”
Get full text
Journal Article -
2
-
3
CISSP: Certified Information Systems Security Professional Study Guide
Published 2008“…Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage…”
Get full text
eBook -
4
CISSP: Certified Information Systems Security Professional Study Guide
Published 2005“…CISSP Certified Information Systems Security Professional Study GuideHere's the book you need to prepare for the challenging CISSP exam from (ISC)¯2. This…”
Get full text
eBook -
5
CISSP: Certified Information Systems Security Professional Study Guide
Published 2012“…Fully updated Sybex Study Guide for the industry-leading security certification: CISSPSecurity professionals consider the Certified Information Systems…”
Get full text
eBook -
6
Spatially Modulated Dose Optimization and Performance Limitations with Robust Targeting Performance for Preclinical Irradiation
Published 01-01-2018“…The flexibility and sophistication of modern external beam radiotherapy treatment planning and delivery methods have advanced techniques to improve the…”
Get full text
Dissertation -
7
CISSP: certified information systems security professional study guide, fourth edition
Published 2008“…"This comprehensive book will guide readers through CISSP exam topics, including: Access Control Application Development Security Business Continuity and…”
Get full text
eBook -
8
-
9
-
10
About the Authors
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
11
Introduction
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
12
Intro
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
13
Risk and Personnel Management
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
14
Access Control Attacks and Monitoring
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
15
Incidents and Ethics
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
16
Security Operations
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
17
-
18
-
19
Business Continuity Planning
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter -
20
Appendix C: About the Additional Study Tools
Published in CISSP: Certified Information Systems Security Professional Study Guide (2012)Get full text
Book Chapter