Search alternatives:
"protectionism" » "protection"

1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

3
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... to Protect Against a DDoS Attack; 2.4.3 Intensity of Attack; 2.4.4 Duration of DDoS Attacks; 2.4.5 Repeat...

4
Published 2018
O'Reilly Media, Inc.

5
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... protection -- Data protection...

6
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

7
by Peltier, Thomas R.
Published 2014
CRC Press, Taylor & Francis Group
Subjects: ...Data protection / fast...

8
by Klotz, Michael, Goeken, Matthias, Fröhlich, Martin
Published 2023
dpunkt.verlag
Subjects: ...Data protection / fast...

9
by Calder, Alan
Published 2005
IT Governance Pub.
Subjects: ...Data protection / fast...

10
by Brotby, W. Krag
Published 2013
CRC Press
Subjects: ...Data protection / fast...

11
by Calder, Alan
Published 2013
IT Governance Publishing
Subjects: ...Data protection / fast...

12
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Subjects: ...Data protection / fast...

13
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ... In Summary 93 Chapter 6: Protection and Privacy of Information Assets in the Cloud 97 The Three Usage...

14
by Ciesla, Robert
Published 2020
Apress
Subjects: ...Data protection / fast...

15
by Krausz, Michael
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Management / Standards...

16
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

17
by Carey, Marcus J., Jin, Jennifer
Published 2019
Wiley
Subjects: ...Data protection / fast...

18
by Calder, Alan
Published 2010
IT Governance Pub.
Subjects: ...Data protection / Management / Standards / Dictionaries...

19
Published 2023
Apress
... How to assess your cybersecurity risks How to evaluate software protections and countermeasures How...

20
by McFedries, Paul, Harvey, Greg
Published 2022
For Dummies
... to secure your data with spreadsheet password protections Perfect for new users of Excel, Excel Workbook...