Search alternatives:
"protectionism" » "protections"

1
by Chou, Philip A.
Published 2007
Elsevier/Academic Press
Table of Contents: ... APPLICATIONS / CH6: SCALABLE AUDIO CODING / CH7: CHANNEL PROTECTION FUNDAMENTALS / CH8: CHANNEL MODELING...

2
by Curry, Ben
Published 2008
Microsoft Press
Table of Contents: ..., Extranet, and Internet Scenarios -- pt. IV. Operating -- 21. Data Protection, Recovery, and Availability...

3
by Baron, Cynthia
Published 2010
New Riders
Table of Contents: ... -- Respecting others' rights -- Roles and large projects -- Owning your work -- Protecting your work...

4
by Da Silva, Maxwell Dayvson, Tavares, Hugo Lopes
Published 2015
Packt Publishing
Table of Contents: ... Your Data); The basic security; Obfuscating critical commands; Networking security; Protecting Redis...

5
by Ferrate, Andres
Published 2011
O'Reilly
Table of Contents: ... Scrolling; Vertical Scrolling; Multiple Pages; Chapter 6. Tuning, Delivering, and Protecting Video Content...

6
by Reagan, Dusty
Published 2010
Wiley Pub.
... of the process, reviews browsing and downloading applications, addresses protecting your information, and more...

7
by Soper, Mark Edward
Published 2005
Que
... lighting, HVAC, and security within the home and remotely. *Manage, protect and troubleshoot the home...

8
by Diaz-Ortiz, Claire
Published 2011
Jossey-Bass
... Foundation, National Wildlife Federation, Kiva, the United Nations, Free the Children, Committee to Protect...