|
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
Table of Contents:
“... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...”Published 2015
John Wiley & Sons, Inc.
|
by Lakshmi, Vasantha
Published 2019
Table of Contents:
“... protection -- Data protection...”Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
|
by Haustein, Nils, Gomez, Jose M., Forsyth, Benjamin C.
Published 2019
“... systems can be protected or shared by replicating these files to another file system that is in a remote...”Published 2019
IBM Corporation, International Technical Support Organization