1
Published 2022
Springer International Publishing
Table of Contents: ... (Caterina Bigoni) -- Chapter 10. Unsupervised data-driven methods for damage identification in discontinuous...

2
by Davidoff, Sherri
Published 2020
Addison-Wesley
... the world's most damaging breaches, Davidoff identifies proven tactics for reducing damage caused...

3
by Grimes, Roger A.
Published 2022
Wiley
Table of Contents: ... ; Minimizing Damage ; Early Responses ; Environment Recovery ; Next Steps ; What Not to Do ; Future...

4
by Krausz, Michael
Published 2014
IT Governance Press
Table of Contents: ...: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence...

5
Published 2017
Springer Nature Singapore
Table of Contents: ..., Representation & Display of Digital Heritage Sites -- Chapter 2. A Methodology to reconstruct large damaged...

6
by OZKAYA, DR ERDAL.
Published 2021
PACKT PUBLISHING LIMITED
... and control cyber threats and network security breaches in a way that decreases damage, recovery time...

7
by Isaacson, Robert L., Spear, Norman E.
Published 1982
Springer US
Table of Contents: ... and Reintegration Following Lateral Hypothalamic Damage -- 3. Sensory Neglect: An Activational Deficit -- 4...

8
by Krausz, Michael
Published 2013
IT Governance Pub.
... or information breach and explains how managers can determine the business damage caused...

9
by Krausz, Michael
Published 2009
IT Governance Pub.
Table of Contents: ... the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft...

10
by Slade, Robert
Published 1994
Springer New York
... of the known viruses and of the damage that they have done, as well as providing guidelines and recommendations...

11
by Greenwood, Tom
Published 2021
A Book Apart
..., thoughtful changes in design and development can reduce the damage, while also making the web more resilient...

12
by Jürjens, Jan
Published 2005
Springer Berlin Heidelberg
...Attacks against computer systems can cause considerable economic or physical damage. High-quality...

13
by Mitchell, Stewart
Published 2009
IT Governance Pub.
... the key measures you need to take to handle the situation and to minimise the damage. The information...

14
by Willemet, Laurence
Published 2022
Springer International Publishing
... force that holds an object strong enough to avoid a catastrophic fall yet gentle enough not to damage...

15
by Waschke, Marvin
Published 2017
Apress

17
Published 2010
Springer US
Table of Contents: ... Awareness -- Topological Vulnerability Analysis -- Cross-Layer Damage Assessment for Cyber Situational...

18
by Kelly, Bob
Published 2008
Wiley
Table of Contents: .... Protecting User Data -- Ch. 13. Recovering Damaged Systems and Lost Data...

19
Published 2004
Springer US
Table of Contents: ... Oriented System Based Information Flow Model for Damage Assessment -- An Efficient OODB Model for Ensuring...

20
by Spilcă, Laurenţiu
Published 2020
Manning Publications Co.
... damage. You'll start with the basics, simulating password upgrades and adding multiple types...