Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Why risk management fails in ITStiennon, RichardNetwork World, 2012-10, Vol.29 (18), p.8Southborough: FoundryTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Network ManagementNetwork World, 2006-02, Vol.23 (8), p.50Southborough: FoundryTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Security ManagementNetwork World, 2006-02, Vol.23 (8), p.54Southborough: FoundryTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Information ManagementNetwork World, 2006-02, Vol.23 (8), p.44Southborough: FoundryTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Mobile management: Apple's extra requirementMessmer, EllenNetwork World, 2012-02, Vol.29 (3), p.10Southborough: FoundryTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
EYE ON MANAGEMENTSchultz, BethNetwork World, 2009-08, Vol.26 (26), p.34Southborough: FoundryTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Managing remote desktop managementGibbs, MarkNetwork World, 2009-09, Vol.26 (28), p.24Southborough: FoundryTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Making role management workTaneja, DeepakNetwork World, 2008-09, Vol.25 (37), p.28Southborough: FoundryTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Unified threat management catching onGreene, TimNetwork World, 2008-09, Vol.25 (38), p.1Southborough: FoundryTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Next battleground: Virtualization managementDubie, DeniseNetwork World, 2008-06, Vol.25 (26), p.46Southborough: FoundryTexto completo disponível |