Search alternatives:
"protectionism" » "protections"

1
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

2
by Paquet, Catherine
Published 2005
Cisco Press
Subjects: ...Data protection / fast...

3
by Branigan, Steven
Published 2004
Addison-Wesley Professional
Subjects: ...Data protection / fast...

4
by Drabick, Rodger
Published 2013
Addison-Wesley Professional
Subjects: ...Data protection / fast...

5
by Rice, William E. Perry. Randall W.
Published 2013
Addison-Wesley Professional
Subjects: ...Data protection / fast...

6
by Amaris, Chris
Published 2010
Sams Pub.
Table of Contents: ... reporting -- Data Protection Manager 2010 design, planning, implementation, and administration -- Using Data...

7
by Wooldridge, Dave
Published 2011
Apress
Table of Contents: ... Protection; Patents; Is Your Invention Patentable?; Avoiding the On Sale Bar; How to File for a Patent...

8
by McCreary, Dan
Published 2014
Manning
Table of Contents: ... agility with NoSQL -- NoSQL and functional programming -- Security: protecting data in your NoSQL systems...

9
by Wooldridge, Dave
Published 2010
Apress
Table of Contents: ...; Chapter 3 Protecting YourIntellectual Property; Chapter 4 Your iPhone App Is Your Most Powerful Marketing...

10
by Mason, Brian
Published 2012
Packt Pub.
Table of Contents: ... ... ; There's more ... ; Offloading the SUP; Offloading Endpoint Protection; Offloading SQL Reporting Services; See...

11
by Stanek, William R.
Published 2005
Microsoft Press
... essential details for using Microsoft SQL Server 2005 to help protect and manage your company's data...

12
by Zikopoulos, Paul
Published 2014
McGraw-Hill Education
... protecting the availability, performance and reliability of essential business applications. In the new era...

13
by Hay, Andrew
Published 2009
Syngress Pub.