Search alternatives:
"protectionism" » "protections"

1
by Seaman, Jim
Published 2021
Apress
Table of Contents: ...Chapter 1: Introduction -- Chapter 2: What is Protective Security (PS)? -- Chapter 3: Protective...

2
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

3
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

4
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

5
Published 2022
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

6
by Sandbu, Marius
Published 2023
Packt Publishing, Limited
Table of Contents: ...Protecting the domains -- Protecting the content and URLs -- Other countermeasures -- Summary...

7
by White, Bill, Avill, Robbie, Batta, Sandeep, Kulkarni, Abhiram
Published 2022
IBM Redbooks
... in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce...

8
by Vacca, John R.
Published 2013
Syngress
Table of Contents: ...Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents...

9
Published 2000
Syngress
Table of Contents: ...-based Mail issues -- Ch. 5. Client-Side Anti-Virus Applications -- Ch. 6. Mobile Code protection -- Ch...

10
by Gordon, Adam
Published 2024
Packt Publishing
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

11
by Petrocelli, Tom
Published 2005
Prentice Hall PTR
Subjects: ...Data protection / fast...

12
by Buffington, Jason
Published 2010
Sybex
...Essential information on how to protect data in virtual environments! Virtualization is changing...

13
by Turley, Alice
Published 2024
IT Governance Publishing
Subjects: ...Data protection / Law and legislation / European Union countries...

14
by Conrad, Peter
Published 2022
O'Reilly Media, Inc.
... and data protection. DevOps engineers, application architects, and site reliability teams, among others...

15
by Grimes, Roger A.
Published 2001
O'Reilly & Associates

16
by Sutton, David
Published 2022
BCS, The Chartered Institute for IT
Subjects: ...Privacy & data protection / bicssc...

17
by Reilly, Daniel
Published 2023
No Starch Press
Subjects: ...Protection de l'information (Informatique) / Mathématiques...

18
by Dalziel, Henry
Published 2015
Elsevier, Syngress
Table of Contents: ... The principle of least priviledge ; 3.2 Detection's folly -- ch. 4. Protection's weak link : 4.1 Desktop...

19
by Collberg, Christian
Published 2009
Addison-Wesley
Table of Contents: ... -- Dynamic watermarking -- Software similarity analysis -- Hardware for protecting software...

20
by Lovelace, Mary
Published 2014
IBM Corp., International Technical Support Organization