Search alternatives:
"protectionism" » "protections"

1
by Gucer, Vasfi
Published 2007
IBM, International Technical Support Organization
...Tivoli continuous data protection for files V3.1...

2
by Mathews, Craig F.
Published 2004
Que
Table of Contents: ... applications -- Data communication and protection -- Using other included and free applications -- Using...

3
by White, Russ
Published 2005
Cisco Press
Table of Contents: ... Routing Systems -- Protecting Routing Domain Legitimacy -- Protecting Routing Information -- Future...

4
by Alvarez, Santiago
Published 2006
Cisco Press

5
by Alamanni, Marco
Published 2015
Packt Publishing
Table of Contents: ... and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting...

6
by Yeluri, Raghu, Castro-Leon, Enrique
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... -- The Data Protection Usage Model -- The Run-time Integrity and Attestation Usage Model -- Trusted Cloud...

7
Published 2019
Academic Press
..., Revisiting VM performance and optimization challenges for big data, Towards Realizing Self-Protecting...

8
by Flickenger, Rob
Published 2003
O'Reilly
...; and understand the security issues of wireless networking, and protect...

9
by Doherty, Jim
Published 2005
Cisco
... and protect yourself from hackers and viruses Go wireless to put your computers where you want them-not just...

10
by Sayed, Sohail
Published 2012
Sams
... Central Administration Protect applications with claims-based authorization and other security features...

11
by Miser, Brad
Published 2012
Sams
..., and protect your data with online backups. Register your book at informit.com/register for convenient access...