1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

3
Published 2018
O'Reilly Media, Inc.

4
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... to Protect Against a DDoS Attack; 2.4.3 Intensity of Attack; 2.4.4 Duration of DDoS Attacks; 2.4.5 Repeat...

5
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... protection -- Data protection...

6
by Peltier, Thomas R.
Published 2014
CRC Press, Taylor & Francis Group
Subjects: ...Data protection / fast...

7
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

8
by Calder, Alan
Published 2005
IT Governance Pub.
Subjects: ...Data protection / fast...

9
by Brotby, W. Krag
Published 2013
CRC Press
Subjects: ...Data protection / fast...

10
by Calder, Alan
Published 2013
IT Governance Publishing
Subjects: ...Data protection / fast...

11
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Subjects: ...Data protection / fast...

12
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ... In Summary 93 Chapter 6: Protection and Privacy of Information Assets in the Cloud 97 The Three Usage...

13
by Ciesla, Robert
Published 2020
Apress
Subjects: ...Data protection / fast...

14
by Krausz, Michael
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Management / Standards...

15
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

16
by Carey, Marcus J., Jin, Jennifer
Published 2019
Wiley
Subjects: ...Data protection / fast...

17
by Calder, Alan
Published 2010
IT Governance Pub.
Subjects: ...Data protection / Management / Standards / Dictionaries...

18
by Fisher, Ed, Chamberlain, Nate
Published 2020
Microsoft Press
... implementation and administration, including identity, access, threat and information protection, governance...

19
by Etheridge, Denise
Published 2007
Wiley Pub.
Table of Contents: .... Protect, save, and print -- 9. Extend Excel -- 10. Customize Excel...

20
by Manning, Anna
Published 2015
Apress
Table of Contents: ... Spreadsheets and Databases -- Chapter 7. Designing Your Small Business Database -- Chapter 8. Data Protection...