Search alternatives:
"protectionism" » "protection"

1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... protection -- Data protection...

3
by Klotz, Michael, Goeken, Matthias, Fröhlich, Martin
Published 2023
dpunkt.verlag
Subjects: ...Data protection / fast...

4
by Calder, Alan
Published 2005
IT Governance Pub.
Subjects: ...Data protection / fast...

5
by Brotby, W. Krag
Published 2013
CRC Press
Subjects: ...Data protection / fast...

6
by Calder, Alan
Published 2013
IT Governance Publishing
Subjects: ...Data protection / fast...

7
by Calder, Alan, Watkins, Steve
Published 2024
IT Governance Publishing Ltd
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

8
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ... In Summary 93 Chapter 6: Protection and Privacy of Information Assets in the Cloud 97 The Three Usage...

9
by Krausz, Michael
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Management / Standards...

10
by Kenyon, Bridget
Published 2024
IT Governance Publishing
Subjects: ...Data protection / Management / Standards...

11
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

12
by Carey, Marcus J., Jin, Jennifer
Published 2019
Wiley
Subjects: ...Data protection / fast...

13
by Calder, Alan
Published 2010
IT Governance Pub.
Subjects: ...Data protection / Management / Standards / Dictionaries...

14
Published 2023
Apress
... How to assess your cybersecurity risks How to evaluate software protections and countermeasures How...

15
by Wun-Young, Leslie
Published 2009
Syngress Pub.
Table of Contents: ... and Access Management; Data Protection; Platform/Operating System Security; Vulnerability Management; Secure...

16
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... Wireless; Laying the foundation -- IEEE 802.11; Understanding wireless protection and security; Wired...

17
by Manning, Anna
Published 2015
Apress
Table of Contents: ... Spreadsheets and Databases -- Chapter 7. Designing Your Small Business Database -- Chapter 8. Data Protection...

18
by Bravo, Cesar, Toska, Desilda
Published 2023
Packt Publishing
Table of Contents: ... baiting -- Cyber baiting -- Protecting yourself against baiting -- Dumpster diving -- Tailgating -- Quid...

19
by Calder, Alan
Published 2023
IT Governance Ltd
Table of Contents: ... 18: Internal audits -- Chapter 19: Malware protection -- Chapter 20: Network and communications...

20
by Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Study 39 -- Summary 41 -- Action Plan 42 -- Notes 42 -- Chapter 4: Endpoint Protection 43 -- Vendors 44...