Search alternatives:
"protectionism" » "protections"

1
by Henriksen, Nicolai
Published 2016
Packt

2
by Gregg, Michael
Published 2012
Pearson IT Certification
Subjects: ...Data protection / fast...

3
by Gregg, Michael
Published 2016
Pearson IT Certification
Subjects: ...Data protection / fast...

4
by Wu, Jinsong
Published 2013
CRC Press
Subjects: ...Technologie de protection de l'environnement...

5
by Spafford, George
Published 2008
IT Governance Pub.
Subjects: ...Technologie de protection de l'environnement...

6
Published 2009
IT Governance Pub.
Table of Contents: ...; Reputational risk; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness...

7
by Haughian, Barry
Published 2018
Apress
Table of Contents: ...Security Components; Data Protection; Chapter 4: The Service Organization; Service Business Owners...

8
by Bott, Frank, Taylor, Neil
Published 2022
BCS, The Chartered Institute for IT
... the GDPR and Data Protection Act, health and safety, and the impact of IT on the environment...

9
by Coupland, Martyn
Published 2014
Packt Publishing
Table of Contents: ... control; Summary; Chapter 4: Security with Endpoint Protection; Configuring the endpoint protection...

10
by Wittkop, Jeremy
Published 2016
Apress, Distributed by Springer Science+Business Media New York
Table of Contents: ...Chapter 1: The Problem We Are Facing -- Chapter 2 : Protecting Critical Assets -- Chapter 3...

11
by Bott, Frank
Published 2005
British Computer Society
Table of Contents: ... Rights; 14 Data Protection, Privacy and Freedom of Information; 15 Internet Issues...

12
Published 2008
Microsoft
... and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP...

13
by Hanks, Douglas Richard
Published 2016
O'Reilly Media
Table of Contents: ...; EVPN and RS; EVPN-VXLAN; Traffic Protection; Traffic Engineering; Load Balancing; Platform Options...

14
by Piper, Ben
Published 2017
Manning Publications Co.
Table of Contents: ... -- Protecting against bridging loops by using the spanning tree protocol -- Optimizing network performance...

15
by Sandbu, Marius
Published 2013
Packt Publishing Ltd.
Table of Contents: ... Roles for High Availability -- Site Server -- Endpoint Protection -- Asset Intelligence Synchronization...

16
by Gilge, Megan
Published 2015
IBM Corporation, International Technical Support Organization
...-in RAID technologies, all data is well-protected with options to add more protection through mirroring...

17
by Gough, Corey, Steiner, Ian, Saunders, Winston
Published 2015
ApressOpen, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... Frequency Scaling""; ""Turbo""; ""Turbo Architecture""; ""Power/Thermal Limits""; ""Thermal Protection...

18
by Kaczmarek, Steve
Published 2008
Microsoft Press
Table of Contents: ... Updates -- 14. Implementing Desired Configuration Management -- 15. Implementing Network Access Protection...

19
by Cheshire, Jim
Published 2019
Microsoft Press
..., and data protection; price subscriptions and manage costs; choose support options; use Service Level...

20
by Klein, Stieg, Maestas, Chris
Published 2022
IBM Redbooks
... is the most innovative system that provides investment protection to expand or build a new Global Data...