1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

3
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

4
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

5
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

6
by Watkins, Steve
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

7
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

8
by Myers, Kenneth N.
Published 2006
Wiley
Table of Contents: ...BUSINESS CONTINUITY STRATEGIES: PROTECTING AGAINST UNPLANNED DISASTERS; CONTENTS; PREFACE; Chapter...

9
Published 2018
O'Reilly Media, Inc.

10
by Wood, Phillip
Published 2012
IT Governance Pub.

11
by Dibble, Suzanne
Published 2019
For Dummies
Subjects: ...Data protection / Government policy / fast...

12
by Calder, Alan
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

13
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... protection -- Data protection...

14
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

15
by Calder, Alan
Published 2005
IT Governance Pub.
Subjects: ...Data protection / fast...

16
by Brotby, W. Krag
Published 2013
CRC Press
Subjects: ...Data protection / fast...

18
by Haustein, Nils, Gomez, Jose M., Forsyth, Benjamin C.
Published 2019
IBM Corporation, International Technical Support Organization
... systems can be protected or shared by replicating these files to another file system that is in a remote...

19
by Bowman, Ronald H.
Published 2008
John Wiley & Sons
Table of Contents: ... and Consequences -- 9. Government's Role: Summary of National Infrastructure Protection Plan of 2006 -- 10. Tier 4...

20
by Calder, Alan
Published 2013
IT Governance Publishing
Subjects: ...Data protection / fast...