1
by Seaman, Jim
Published 2021
Apress
Table of Contents: ...Chapter 1: Introduction -- Chapter 2: What is Protective Security (PS)? -- Chapter 3: Protective...

2
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

3
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

4
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

5
Published 2022
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

6
by Vacca, John R.
Published 2013
Syngress
Table of Contents: ...Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents...

7
by Sandbu, Marius
Published 2023
Packt Publishing, Limited
Table of Contents: ...Protecting the domains -- Protecting the content and URLs -- Other countermeasures -- Summary...

8
by White, Bill, Avill, Robbie, Batta, Sandeep, Kulkarni, Abhiram
Published 2022
IBM Redbooks
... in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce...

9
by Petrocelli, Tom
Published 2005
Prentice Hall PTR
Subjects: ...Data protection / fast...

10
Published 2000
Syngress
Table of Contents: ...-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch...

11
by Gordon, Adam
Published 2024
Packt Publishing
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

12
by Shackleford, Dave
Published 2013
Wiley
... practices, and strategies used for securing physical environments do not provide sufficient protection...

13
by Buffington, Jason
Published 2010
Sybex
...Essential information on how to protect data in virtual environments! Virtualization is changing...

14
by Henry, Kevin M.
Published 2012
IT Governance Pub.
Table of Contents: ...Appendix 3: Regulations and LegislationExamples of regulations and legislation; Protection...

15
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... to Protect Against a DDoS Attack; 2.4.3 Intensity of Attack; 2.4.4 Duration of DDoS Attacks; 2.4.5 Repeat...

16
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.

17
by Wade, Todd
Published 2022
BCS, The Chartered Institute for IT

18
by Bahadur, Gary
Published 2002
Que

19
by Conrad, Peter
Published 2022
O'Reilly Media, Inc.
... and data protection. DevOps engineers, application architects, and site reliability teams, among others...

20
by Miller, Michael
Published 2008
Que
Table of Contents: ... is watching you -- Covering your tracks online -- Protecting yourself--and your children--from online...