Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("protectionism" OR "protection")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
author_facet:"Messier, Ric"
language:"English"
product_txtF_mv:"O'Reilly"
Search alternatives
:
"protectionism" »
"protections"
Showing
1
-
9
of
9
Search:
'("protectionism" OR "protection")'
,
query time: 0.35s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Preparing for a network incident
by
Messier, Ric
Published 2015
O'Reilly
Subjects:
“
...
Protection
de l'information (Informatique) / Gestion...
”
Call Number:
TK5105.59
Read Now
2
CEH v11 certified ethical hacker study guide
by
Messier, Ric
Published 2021
Sybex, a Wiley brand
Table of Contents:
“
... Standards 67 -- Procedures 68 -- Guidelines 68 -- Organizing Your
Protections
69 -- Security Technology 72...
”
Call Number:
QA76.9.A25
Read Now
3
Collaboration with cloud computing : security, social media, and unified communications
by
Messier, Ric
Published 2014
Syngress
Table of Contents:
“
...; Data destruction; Infrastructure;
Protecting
yourself; Encryption; Data loss prevention; Conclusion...
”
Call Number:
QA76.9.A25
Read Now
4
The value of operations security
by
Messier, Ric
Published 2016
O'Reilly
“
... not guarantee that your organization is well-
protected
against attack. Your organization needs a good operations...
”
Call Number:
HD30.2
Read Now
5
Learning Whitehat hacking and penetration testing
by
Messier, Ric
Published 2012
InfiniteSkills
“
... the essentials you will need to know to harden and
protect
your hardware and software to avoid downtime and loss...
”
Call Number:
QA76.9.A25
Read Now
6
Evidence acquisition and handling : understand the techniques law enforcement professionals must use when working with digital evidence
by
Messier, Ric
Published 2017
O'Reilly
“
... and intrusions. This course teaches you the techniques required for acquiring, validating, and
protecting
digital...
”
Call Number:
K2269.5
Read Now
7
Penetration testing with the Metasploit Framework : a quickstart guide to White Hat security discovery and exploitation
by
Messier, Ric
Published 2016
O'Reilly
“
..."An essential requirement for
protecting
any organization's computer and network systems from...
”
Call Number:
QA76.9.A25
Read Now
8
Professional guide to wireless network hacking and penetration testing
by
Messier, Ric
Published 2015
Infinite Skills
“
... to
protect
Bluetooth. Finally, you will cover other wireless communications, such as WiMax, ZigBee, and RFID...
”
Call Number:
TK5103.2
Read Now
9
Learning TCP-IP
by
Messier, Ric
Published 2013
InfiniteSkills
“
... fundamentals is also covered, with tips on
protecting
your data with WEP and WPA. Finally, Ric breaks down what...
”
Call Number:
TK5105.585
Back
Narrow Search
Remove Filters
Clear Filter
Author: Messier, Ric
Clear Filter
Language: English
Clear Filter
Collection: O'Reilly
Year of Publication
From:
To:
Classification
000 - Computer science, information & general works
7
331 - Labor economics
4
658 - General management
3
005 - Computer programming, programs & data
1
305 - Social groups
1
364 - Criminology
1
more ...
374 - Adult education
1
384 - Communications; telecommunication
1
see all ...
less ...
Language
English
Collection
O'Reilly
Author
Messier, Ric
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=author_facet%3A%22Messier%2C+Ric%22&filter%5B%5D=language%3A%22English%22&filter%5B%5D=product_txtF_mv%3A%22O%27Reilly%22&lookfor=%28%22protectionism%22+OR+%22protection%22%29&type=AllFields
Send by Email
×
Loading...