Search alternatives:
"protectionism" » "protections"

1
by Petrocelli, Tom
Published 2005
Prentice Hall PTR
Subjects: ...Data protection / fast...

2
by Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents: ... Protection for Exchange Server; Understanding Forefront Protection for Exchange Server; Architecture...

3
by Ganger, Devin L.
Published 2008
Wiley Pub.
Subjects: ...Data protection manager / http://id.loc.gov/authorities/names/n2007075165...

4
by Harkins, Malcolm
Published 2013
Apress
... challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective...

5
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

6
by Dennedy, Michelle Finneran
Published 2014
Apress Open
Subjects: ...Data protection / fast...

7
Published 2000
Sams

8
by Tynan, Dan
Published 2005
O'Reilly
Subjects: ...Data protection / fast...

9
by Paquet, Catherine
Published 2005
Cisco Press
Subjects: ...Data protection / fast...

10
by Branigan, Steven
Published 2004
Addison-Wesley Professional
Subjects: ...Data protection / fast...

11
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ...How the Internet works -- How hackers break into your PC and how to protect against them -- How...

12
by Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents: ...Forefront Unified Access Gateway 2010Forefront Identity Manager; Forefront Protection for Exchange...

13
by Szor, Peter
Published 2005
Addison-Wesley
Table of Contents: ...-protection strategies -- Advanced code evolution techniques and computer virus generator kits...

14
by Amaris, Chris
Published 2010
Sams Pub.
Table of Contents: ... reporting -- Data Protection Manager 2010 design, planning, implementation, and administration -- Using Data...

15
by Sharp, John
Published 2010
Microsoft/O'Reilly
Table of Contents: ...; Implementing Security in a Windows Domain; Protecting a TCP Service at the Message Level; Protecting an HTTP...

16
by Grimes, Roger A.
Published 2007
Wiley Technology Pub.
Table of Contents: .... Application security -- 7. Vista client protection -- pt. III. Securing Internet and e-mail access -- 8...

17
by Silberschatz, Abraham
Published 2005
J. Wiley & Sons
Table of Contents: ...-storage structure -- I/O systems -- Protection -- Security -- Distributed system structures -- Distributed...

18
by McCreary, Dan
Published 2014
Manning
Table of Contents: ... agility with NoSQL -- NoSQL and functional programming -- Security: protecting data in your NoSQL systems...

19
by Sullivan, Chad
Published 2006
Cisco
...Protecting systems within an enterprise has proven as important to overall security as securing...

20
by Tidrow, Rob, Boyce, Jim, Shapiro, Jeffrey R.
Published 2015
Wiley
Table of Contents: ... ; Troubleshooting startup problems -- Personalizing Windows 10. Protecting yourself with Windows firewall...