Search alternatives:
"protections" » "projections", "protecting"

1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

3
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect...

4
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... Wireless; Laying the foundation -- IEEE 802.11; Understanding wireless protection and security; Wired...

5
by Evans, Ariel
Published 2022
Routledge
... reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers...

6
by Rehberger, Johann
Published 2020
Packt Publishing
... ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters...

7
by Liska, Allan
Published 2018
O'Reilly Media
...Many organizations are discovering that traditional security tools alone aren't enough to protect...