1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Mukherjee, Akash
Published 2024
Packt Publishing Ltd.
Table of Contents: ...Organizing defensive controls -- Security layers -- Protecting perimeters to information...

3
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

4
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... Wireless; Laying the foundation -- IEEE 802.11; Understanding wireless protection and security; Wired...

5
by Davidoff, Sherri
Published 2020
Addison-Wesley
...Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can...

6
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
... be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways...