Search alternatives:
"protectionism" » "protection"

1
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

2
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... to Protect Against a DDoS Attack; 2.4.3 Intensity of Attack; 2.4.4 Duration of DDoS Attacks; 2.4.5 Repeat...

3
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... protection -- Data protection...

4
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

5
by Calder, Alan
Published 2005
IT Governance Pub.
Subjects: ...Data protection / fast...

6
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Subjects: ...Data protection / fast...

7
by Ciesla, Robert
Published 2020
Apress
Subjects: ...Data protection / fast...

8
by Krausz, Michael
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Management / Standards...

9
by Kenyon, Bridget
Published 2024
IT Governance Publishing
Subjects: ...Data protection / Management / Standards...

10
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

11
by Carey, Marcus J., Jin, Jennifer
Published 2019
Wiley
Subjects: ...Data protection / fast...

12
by Calder, Alan
Published 2010
IT Governance Pub.
Subjects: ...Data protection / Management / Standards / Dictionaries...

13
by Dhru, Nidhish
Published 2018
Apress
Table of Contents: ...; Exchange Online Protection (EOP); Advanced Threat Protection (ATP); DLP....

14
by Manning, Anna
Published 2015
Apress
Table of Contents: ... Spreadsheets and Databases -- Chapter 7. Designing Your Small Business Database -- Chapter 8. Data Protection...

15
by Boyce, Jim
Published 2007
Microsoft Press
Table of Contents: ... outlook data -- Security and virus protection -- Delegating responsibilities to an assistant -- Sharing...

16
by Boyce, Jim
Published 2010
O'Reilly Media
Table of Contents: ... and organizing Outlook data ; Security and virus protection -- Collaboration. Delegating responsibilities...

17
by Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Study 39 -- Summary 41 -- Action Plan 42 -- Notes 42 -- Chapter 4: Endpoint Protection 43 -- Vendors 44...

18
by Crawley, Kim
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... -- An Introduction to Common Data Privacy Regulations -- The General Data Protection Regulation -- The California...

19
by Jeschke, Egbert
Published 2012
Microsoft Press
Table of Contents: ...; Converting Existing Values; Protecting Formulas; Hiding Formulas; Specifying the Formula Calculation Type...

20
by Neagu, Adrian
Published 2012
Packt Pub.
Table of Contents: ... network security kernel tunables to protect your system; How to do it ... ; How it works...