Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "protection"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"330 - Economics"
dewey-ones:"364 - Criminology"
language:"English"
Showing
1
-
6
of
6
Search:
'"protection"'
,
query time: 0.03s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Ransomware
protection
playbook
by
Grimes, Roger A.
Published 2022
Wiley
“
... destructive IT threats and learning about concrete steps that can be taken now to
protect
organizations from...
”
Call Number:
QA76.76.C68
Read Now
2
The complete guide to defense in depth : learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
by
Mukherjee, Akash
Published 2024
Packt Publishing Ltd.
Table of Contents:
“
...Organizing defensive controls -- Security layers --
Protecting
perimeters to information...
”
Call Number:
HD30.38
Read Now
3
The true cost of information security breaches and cyber crime
by
Krausz, Michael
Published 2013
IT Governance Pub.
Subjects:
“
...
Protection
de l'information (Informatique) / Aspect économique / Études de cas...
”
Call Number:
QA76.9.A25
Read Now
4
Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by
Datt, Samir
Published 2016
Packt Publishing
Table of Contents:
“
... Wireless; Laying the foundation -- IEEE 802.11; Understanding wireless
protection
and security; Wired...
”
Call Number:
TK5105.59
Read Now
5
Data breaches : crisis and opportunity
by
Davidoff, Sherri
Published 2020
Addison-Wesley
“
...
Protect
Your Organization Against Massive Data Breaches and Their Consequences Data breaches can...
”
Call Number:
TK5105.59
Read Now
6
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)
by
Bochman, Andrew A.
,
Freeman, Sarah G.
Published 2021
CRC Press
“
... be applied to the most important cybersecurity challenges and in so doing,
protect
organizations in ways...
”
Call Number:
QA76.9.A25
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 330 - Economics
Clear Filter
Classification: 364 - Criminology
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
330 - Economics
364 - Criminology
331 - Labor economics
5
338 - Production
4
658 - General management
2
more ...
001 - Knowledge
1
500 - Natural sciences & mathematics
1
600 - Technology
1
670 - Manufacturing
1
see all ...
less ...
Language
English
Collection
O'Reilly
6
Author
Bochman, Andrew A.
1
Datt, Samir
1
Davidoff, Sherri
1
Freeman, Sarah G.
1
Grimes, Roger A.
1
Krausz, Michael
1
more ...
Mukherjee, Akash
1
Walker, John
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22330+-+Economics%22&filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&filter%5B%5D=language%3A%22English%22&lookfor=%22protection%22&type=AllFields
Send by Email
×
Loading...