Search alternatives:
"protections" » "projections", "protecting"

1
Published 2023
The MIT Press

2
Published 2008
Springer US
Table of Contents: ...: Are Economic Incentives Adequate? -- Government Intervention in Information Infrastructure Protection...

3
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data protection...

4
Published 2008
Springer US
... information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II...

5
Published 2021
Springer International Publishing
Subjects: ...Data protection / Law and legislation...

6
by Bari, Paola
Published 2005
IBM, International Support Organization
Table of Contents: ...Chapter 1. APPC Protected Conversation introduction and theory -- Chapter 2. Upgrading your...

7
Published 2024
Springer Nature Switzerland
Table of Contents: ... Synthetic Data preserve Manifold properties?. -- ”Alexa, How Do You Protect My Privacy?” A Quantitative...

8
by Henriksen, Nicolai
Published 2016
Packt

9
Published 2013
Springer Berlin Heidelberg
Table of Contents: ..., policy compliance and obligations -- Privacy protection -- Risk analysis and security metrics -- Social...

10
Published 2009
Springer Netherlands
Table of Contents: ... Technologies for Harbour Protection...

11
by Gucer, Vasfi
Published 2006
IBM Corp. International Technical Support Organization
...Tivoli continuous data protection for files...

12
by Stübing, Hagen
Published 2013
Springer Fachmedien Wiesbaden
... data verification are proposed, which promise efficient message content protection at a low...

14
by Gucer, Vasfi
Published 2007
IBM, International Technical Support Organization
...Tivoli continuous data protection for files V3.1...

15
by Vora, Zeal
Published 2017
Packt Publishing
Table of Contents: ... for all data encryption -- Scenario 2-multiple keys for data encryption -- Protecting the access keys...

16
by Wheeler, Aaron, Winburn, Michael
Published 2015
Elsevier
Subjects: ...Data protection / fast...

17
by Penwell, Tasha
Published 2023
Apress
Subjects: ...Data protection...

20
by Göbel, Susanne
Published 2016
Springer Fachmedien Wiesbaden
... pass hierarchical protection domains like firewalls. The work analyses MA’s function principles...