Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("protectionism" OR "protection")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"384 - Communications; telecommunication"
language:"English"
Search alternatives
:
"protectionism" »
"protections"
Showing
1
-
20
of
61
Search:
'("protectionism" OR "protection")'
,
query time: 0.67s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mastering System Center Data
Protection
Manager 2007
by
Ganger, Devin L.
Published 2008
Wiley Pub.
Subjects:
“
...Data
protection
manager / http://id.loc.gov/authorities/names/n2007075165...
”
Call Number:
QA76.9.A25
Read Now
2
Deploying Microsoft Forefront
Protection
2010 for Exchange Server
by
Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents:
“
...
Protection
for Exchange Server; Understanding Forefront
Protection
for Exchange Server; Architecture...
”
Call Number:
QA76.9.A25
Read Now
3
ISO/IEC 27701:2019 : an introduction to privacy information management
by
Shipman, Alan
,
Watkins, Steve
Published 2020
IT Governance Publishing
Subjects:
“
...Data
protection
/ Standards...
”
Call Number:
HF5548.37
Read Now
4
The business case for network security : advocacy, governance, and ROI
by
Paquet, Catherine
Published 2005
Cisco Press
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
TK5105.59
Read Now
5
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats
by
Tevault, Donald A.
Published 2018
Packt Publishing
“
..., and
protecting
user accounts...
”
Call Number:
QA76.9.A25
Read Now
6
HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT
by
Branigan, Steven
Published 2004
Addison-Wesley Professional
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
TK5105.59
Read Now
7
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
by
Bachrach, Daniel G.
,
Rzeszut, Eric J.
Published 2014
Apress
Table of Contents:
“
... and Two-Factor Authentication; Bigger Can Be Better. . .; Mix It Up;
Protecting
Passwords; What Should You...
”
Call Number:
QA76.9.A25
Read Now
8
Mobile device security for dummies
by
Campagna, Rich R.
Published 2011
Wiley Pub.
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
TK5102.85
Read Now
9
Infosecurity 2008 threat analysis
by
Clark, Champ
Published 2008
Syngress Pub.
Table of Contents:
“
... -- XSS attack methods --
Protecting
critical infrastructure : process control and SCADA -- Final thoughts...
”
Call Number:
QA76.9.D314
Read Now
10
Netcat power tools
by
Kanclirz, Jan
Published 2008
Syngress Pub.
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
QA76.9.A25
Read Now
11
Practical Hadoop security
by
Lakhe, Bhushan
Published 2014
Apress
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
QA76.9.D314
Read Now
12
ISO/IEC 27701:2022 : an introduction to information security and the ISMS standard
by
Watkins, Steve
Published 2023
IT Governance Publishing
Subjects:
“
...Data
protection
/ Standards...
”
Call Number:
QA76.9.A25
Read Now
13
Expert Oracle and Java security : programming secure Oracle database applications with Java
by
Coffin, David
Published 2011
Apress
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
QA76.9.D314
Read Now
14
Deploying Microsoft Forefront Threat Management Gateway 2010
by
Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents:
“
...Forefront Unified Access Gateway 2010Forefront Identity Manager; Forefront
Protection
for Exchange...
”
Call Number:
TK5105.59
Read Now
15
Blackjacking : security threats to Blackberry devices, PDAs, and cell phones in the enterprise
by
Hoffman, Daniel
Published 2007
Wiley Pub.
Table of Contents:
“
... BlackBerry devices -- Ch. 4. Hacking the supporting BlackBerry infrastructure -- Ch. 5.
Protecting
your PC...
”
Call Number:
TK5103.2
Read Now
16
Wireless communications security : solutions for the internet of things
by
Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents:
“
... Management -- Security Risks in the Wireless Environment -- Monitoring and
Protection
Techniques -- Future...
”
Call Number:
TK5103.2
Read Now
17
Pro PHP and jQuery
by
Lengstorf, Jason
Published 2010
Apress
Table of Contents:
“
... controls to create, edit, and delete events -- Password
protecting
sensitive actions and areas -- Enhancing...
”
Call Number:
QA76.73.P224
Read Now
18
Comprehensive guide to 5G security
Published 2018
John Wiley & Sons
Table of Contents:
“
... 3.2.4.4 Security Threat Analysis for 4G 65 3.2.5 Security Threats and
Protection
for 5G 66 3.2.5.1 Next...
”
Call Number:
TK5103.2
Read Now
19
Cisco Security Agent
by
Sullivan, Chad
Published 2005
Cisco
Call Number:
TK5105.59
Read Now
20
Wireless security
by
Osterhage, Wolfgang
Published 2011
CRC Press
“
... PrinciplesOperating SystemsServicesMobile Phones and WLANThreats and
Protection
Special Case BlackberriesSmart...
”
Call Number:
TK5103.2
1
2
3
4
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 384 - Communications; telecommunication
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
384 - Communications; telecommunication
331 - Labor economics
39
500 - Natural sciences & mathematics
29
620 - Engineering & allied operations
21
658 - General management
9
more ...
374 - Adult education
6
364 - Criminology
2
001 - Knowledge
1
006 - Special computer methods
1
302 - Social interaction
1
330 - Economics
1
381 - Commerce
1
650 - Management & auxiliary services
1
745 - Decorative arts
1
see all ...
less ...
Language
English
Collection
O'Reilly
61
Author
Diogenes, Yuri
3
Shinder, Thomas W.
3
Chapple, Mike
2
Gibson, Darril
2
Stewart, James Michael
2
Watkins, Steve
2
more ...
Abro, Ahmed Bux
1
Abu-Nimeh, Saeed
1
Ahmad, Ijaz
1
Akila, M.
1
Alazab, Mamoun
1
Anil Kumar, Budati
1
Aslam, Abdul
1
Bachrach, Daniel G.
1
Barnett, Ryan C.
1
Baskin, Brian
1
Bauhaus, Mark
1
Behringer, Michael H.
1
Behtash, Behzad
1
Benjamin, Henry
1
Boyce, Jim
1
Branigan, Steven
1
Cache, Johnny
1
Calder, Alan
1
Campagna, Rich R.
1
Chandra, Praphul
1
Cheruvu, Sunil
1
Clark, Champ
1
Clark, Chris
1
Coffin, David
1
Collier-Brown, David
1
Collins, Michael
1
Crane, Dave
1
Donaldson, Scott E.
1
Dubrawsky, Ido
1
Dunham, Ken
1
Dwivedi, Himanshu
1
Dysart, Derek
1
Eckstein, Robert
1
Femling, Ryan
1
Ganger, Devin L.
1
Gay, Warren W.
1
Gillis, Tom
1
Glaser, J. D.
1
Gurtov, Andrei
1
Herrmann, Debra S.
1
Hoda, Mynul
1
Hoffman, Daniel
1
Ishac, Wagdy
1
Iyer, Sibbu
1
James, Darren
1
Jaswal, Nipun
1
John, Teenu S.
1
Jugge, Praveen
1
Kanclirz, Jan
1
Kelly, Peter
1
Klein, Scott
1
Krishnan, Ashwin
1
Kumar, Anil
1
Lakhe, Bhushan
1
Lakshmi Prasad, Kolalapudi
1
Lengstorf, Jason
1
Liyanage, Madhusanka
1
Maheswar, R.
1
Manning (Firm)
1
Meta Brains (Firm)
1
Morrow, Monique
1
Noonan, Wesley J.
1
Norvell, Preston
1
Osterhage, Wolfgang
1
Otnes, Kevin
1
Paquet, Catherine
1
Pascarello, Eric
1
Penttinen, Jyrki T. J.
1
Posey, Brien
1
Potter, Bruce
1
Poulton, Nigel
1
Powers, David
1
Ramesh, Gajula
1
Rathee, Geetanjali
1
Regalado, Daniel
1
Roggero, Herve
1
Rzeszut, Eric J.
1
Saxe, Warren
1
Sheresh, Beth
1
Sheresh, Doug
1
Shipman, Alan
1
Siegel, Stanley G.
1
Smith, Ned
1
Sountharrajan, S.
1
Sullivan, Chad
1
Surendran, Roopak
1
Sutherland, Bruce
1
Talaat, Sherif
1
Tevault, Donald A.
1
Thiel, David V.
1
Thomas, Tony
1
Wheeler, David
1
Williams, Chris K.
1
Wong, David
1
see all ...
less ...
Recently Uploaded
Last Month
2
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&filter%5B%5D=language%3A%22English%22&lookfor=%28%22protectionism%22+OR+%22protection%22%29&type=AllFields
Send by Email
×
Loading...