1
by Bari, Paola
Published 2005
IBM, International Support Organization
Table of Contents: ...Chapter 1. APPC Protected Conversation introduction and theory -- Chapter 2. Upgrading your...

2
by Gucer, Vasfi
Published 2006
IBM Corp. International Technical Support Organization
...Tivoli continuous data protection for files...

3
by Henriksen, Nicolai
Published 2016
Packt

4
by Vora, Zeal
Published 2017
Packt Publishing

5
by Gucer, Vasfi
Published 2007
IBM, International Technical Support Organization
...Tivoli continuous data protection for files V3.1...

6
by Nickel, Jochen
Published 2019
Packt Publishing
... protection strategies Design and deploy custom Identity and access management solutions Build a complete...

7
by Chuvakin, Anton
Published 2010
Syngress
Table of Contents: ... and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data...

8
by Norberg, Scott
Published 2020
Apress
Subjects: ...Data protection / fast...

9
by Gregg, Michael
Published 2012
Pearson IT Certification
Subjects: ...Data protection / fast...

10
by Gregg, Michael
Published 2016
Pearson IT Certification
Subjects: ...Data protection / fast...

11
by Gibson, Darril
Published 2011
Wiley
Table of Contents: ...Using Secure Dynamic Updates -- Chapter 7: Protecting a Network -- Identifying Common Attack...

12
Published 2009
IT Governance Pub.
Table of Contents: ...; Reputational risk; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness...

13
by Haughian, Barry
Published 2018
Apress
Table of Contents: ...Security Components; Data Protection; Chapter 4: The Service Organization; Service Business Owners...

14
by Bott, Frank, Taylor, Neil
Published 2022
BCS, The Chartered Institute for IT
... the GDPR and Data Protection Act, health and safety, and the impact of IT on the environment...

15
by Hanks, Douglas Richard, Reynolds, Harry, Roy, David
Published 2016
O'Reilly Media
Table of Contents: ..., hierarchical policing, and tri-color marking -- Routing engine protection and DDoS prevention -- Trio class...

16
by Piens, Tom
Published 2021
Packt Publishing
Table of Contents: ...Table of Contents Centralizing logs Configuring Advanced GlobalProtect Features Setting up site...

17
by Maniktala, Sanjaya
Published 2013
McGraw-Hill Education
Table of Contents: ... -- Magnetics -- Isolation, PCB design, and safety -- Surge testing and protection -- Lab skills, thermal...

18
by Pióro, Michał
Published 2004
Elsevier/Morgan Kaufmann
Table of Contents: ... MODELS -- Chapter 9 -- Restoration and Protection Design of Resilient Networks -- Chapter 10...

19
by Coupland, Martyn
Published 2014
Packt Publishing
Table of Contents: ... control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection...

20
by Hanks, Douglas Richard
Published 2012
O'Reilly Media
... Router Engine DDoS Protection, Multi-chassis LAG, Inline NAT, IPFIX/J-Flow, and many other Juniper MX...