Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("protectionism" OR "protection")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"500 - Natural sciences & mathematics"
dewey-ones:"620 - Engineering & allied operations"
language:"English"
Search alternatives
:
"protectionism" »
"protections"
Showing
1
-
20
of
57
Search:
'("protectionism" OR "protection")'
,
query time: 0.38s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Data
Protection
and Information Lifecycle Management
by
Petrocelli, Tom
Published 2005
Prentice Hall PTR
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
QA76.9.A25P53 2005
Read Now
2
Deploying Microsoft Forefront
Protection
2010 for Exchange Server
by
Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents:
“
...
Protection
for Exchange Server; Understanding Forefront
Protection
for Exchange Server; Architecture...
”
Call Number:
QA76.9.A25
Read Now
3
Mastering System Center Data
Protection
Manager 2007
by
Ganger, Devin L.
Published 2008
Wiley Pub.
Subjects:
“
...Data
protection
manager / http://id.loc.gov/authorities/names/n2007075165...
”
Call Number:
QA76.9.A25
Read Now
4
Managing risk and information security : protect to enable
by
Harkins, Malcolm
Published 2013
Apress
“
... challenges, Managing Risk and Information Security:
Protect
to Enable provides a much-needed perspective...
”
Call Number:
QA76.9.A25
Read Now
5
The computer incident response planning handbook : executable plans for protecting information at risk
by
McCarthy, N. K.
Published 2012
McGraw-Hill
“
...Executable plans for
protecting
information at risk...
”
Call Number:
TK5105.59
Read Now
6
The privacy engineer's manifesto : getting from policy to code to QA to value
by
Dennedy, Michelle Finneran
Published 2014
Apress Open
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
HF5548.37
Read Now
7
Maximum Linux security : a hacker's guide to protecting your Linux server and workstation
Published 2000
Sams
Call Number:
QA76.9.A25
Read Now
8
Computer privacy annoyances : how to avoid the most ANNOYING invasions of your personal and online privacy
by
Tynan, Dan
Published 2005
O'Reilly
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
QA76.9.A25
Read Now
9
The business case for network security : advocacy, governance, and ROI
by
Paquet, Catherine
Published 2005
Cisco Press
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
TK5105.59
Read Now
10
HIGH-TECH CRIMES REVEALED : CYBERWAR STORIES FROM THE DIGITAL FRONT
by
Branigan, Steven
Published 2004
Addison-Wesley Professional
Subjects:
“
...Data
protection
/ fast...
”
Call Number:
TK5105.59
Read Now
11
How personal & Internet security works
by
Gralla, Preston
Published 2006
Que Pub.
Table of Contents:
“
...How the Internet works -- How hackers break into your PC and how to
protect
against them -- How...
”
Call Number:
HV6673
Read Now
12
Deploying Microsoft Forefront Threat Management Gateway 2010
by
Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents:
“
...Forefront Unified Access Gateway 2010Forefront Identity Manager; Forefront
Protection
for Exchange...
”
Call Number:
TK5105.59
Read Now
13
The art of computer virus research and defense
by
Szor, Peter
Published 2005
Addison-Wesley
Table of Contents:
“
...-
protection
strategies -- Advanced code evolution techniques and computer virus generator kits...
”
Call Number:
QA76.76.C68
Read Now
14
Microsoft System Center Enterprise suite unleashed
by
Amaris, Chris
Published 2010
Sams Pub.
Table of Contents:
“
... reporting -- Data
Protection
Manager 2010 design, planning, implementation, and administration -- Using Data...
”
Call Number:
QA76.76.I57
Read Now
15
Windows Communication Foundation 4 step by step
by
Sharp, John
Published 2010
Microsoft/O'Reilly
Table of Contents:
“
...; Implementing Security in a Windows Domain;
Protecting
a TCP Service at the Message Level;
Protecting
an HTTP...
”
Call Number:
QA76.76.O63
Read Now
16
Windows Vista security : securing Vista against malicious attacks
by
Grimes, Roger A.
Published 2007
Wiley Technology Pub.
Table of Contents:
“
.... Application security -- 7. Vista client
protection
-- pt. III. Securing Internet and e-mail access -- 8...
”
Call Number:
QA76.9.A25
Read Now
17
Operating system concepts
by
Silberschatz, Abraham
Published 2005
J. Wiley & Sons
Table of Contents:
“
...-storage structure -- I/O systems --
Protection
-- Security -- Distributed system structures -- Distributed...
”
Call Number:
QA76.76.O63
Read Now
18
Making sense of NoSQL : a guide for managers and the rest of us
by
McCreary, Dan
Published 2014
Manning
Table of Contents:
“
... agility with NoSQL -- NoSQL and functional programming -- Security:
protecting
data in your NoSQL systems...
”
Call Number:
QA76.9.D3
Read Now
19
Advanced host intrusion prevention with CSA
by
Sullivan, Chad
Published 2006
Cisco
“
...
Protecting
systems within an enterprise has proven as important to overall security as securing...
”
Call Number:
QA76.9.A25
Read Now
20
Windows 10 bible
by
Tidrow, Rob
,
Boyce, Jim
,
Shapiro, Jeffrey R.
Published 2015
Wiley
Table of Contents:
“
... ; Troubleshooting startup problems -- Personalizing Windows 10.
Protecting
yourself with Windows firewall...
”
Call Number:
QA76.774.M434
1
2
3
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 500 - Natural sciences & mathematics
Clear Filter
Classification: 620 - Engineering & allied operations
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
500 - Natural sciences & mathematics
620 - Engineering & allied operations
384 - Communications; telecommunication
20
331 - Labor economics
17
658 - General management
7
more ...
374 - Adult education
2
745 - Decorative arts
2
006 - Special computer methods
1
301 - Sociology & anthropology
1
302 - Social interaction
1
330 - Economics
1
338 - Production
1
364 - Criminology
1
381 - Commerce
1
see all ...
less ...
Language
English
Collection
O'Reilly
57
Author
Diogenes, Yuri
3
Shinder, Thomas W.
3
Sullivan, Chad
2
Amaris, Chris
1
Asher, J. A.
1
Barnett, Ryan C.
1
more ...
Behringer, Michael H.
1
Behtash, Behzad
1
Benjamin, Henry
1
Boyce, Jim
1
Bradford, Ronald
1
Branigan, Steven
1
Cowart, Robert
1
Crane, Dave
1
Crowley, Ed
1
Del Sole, Alessandro
1
Dennedy, Michelle Finneran
1
Dubrawsky, Ido
1
Femling, Ryan
1
Finneran, Thomas R.
1
Fox, Jonathan
1
Gagne, Greg
1
Galvin, Peter B.
1
Ganger, Devin L.
1
Gillis, Tom
1
Graff, Mark
1
Gralla, Preston
1
Grimes, Roger A.
1
Gupta, Ajay
1
Hadnagy, Christopher
1
Haletky, Edward
1
Halvorson, Michael
1
Harkins, Malcolm
1
Hoda, Mynul
1
James, Darren
1
Johansson, Jesper M.
1
Kelly, Ann
1
Kettell, Greg
1
Kettell, Jennifer Ackerman
1
Klaben, Jeff
1
Klevinsky, T. J.
1
Knittel, Brian
1
Lajoie, Josée
1
Laliberte, Scott
1
Laphroaig, Manul
1
Lippman, Stanley B.
1
Mangla, Anoopt
1
Mauvais, Paul
1
McCarthy, N. K.
1
McCreary, Dan
1
Miser, Brad
1
Moo, Barbara E.
1
Morimoto, Rand
1
Morrow, Monique
1
Moskowitz, Jeremy
1
Nolan, Godfrey
1
Noonan, Wesley J.
1
Norberg, Stefan
1
Norvell, Preston
1
Paquet, Catherine
1
Pascarello, Eric
1
Petrocelli, Tom
1
Potter, Bruce
1
Powers, David
1
Ray, John
1
Regalado, Daniel
1
Saxe, Warren
1
Shapiro, Jeffrey R.
1
Sharp, John
1
Shetty, Sachin
1
Silberschatz, Abraham
1
Stanek, William R.
1
Sutherland, Bruce
1
Szor, Peter
1
Terry, J. P.
1
Tidrow, Rob
1
Todd, Matthew
1
Tynan, Dan
1
Ummer, Firosh
1
Van Wyk, Kenneth R.
1
Vasudevan, Vinod
1
Walker, Andy
1
Widup, Suzanne
1
Wotring, Brian
1
Wrightson, Tyler
1
Zikopoulos, Paul
1
Zukowski, John
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22500+-+Natural+sciences+%26+mathematics%22&filter%5B%5D=dewey-ones%3A%22620+-+Engineering+%26+allied+operations%22&filter%5B%5D=language%3A%22English%22&lookfor=%28%22protectionism%22+OR+%22protection%22%29&type=AllFields
Send by Email
×
Loading...