Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("protection" or "protections")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"330 - Economics"
dewey-ones:"338 - Production"
dewey-ones:"364 - Criminology"
Search alternatives
:
"protections" »
"projections"
,
"protecting"
Showing
1
-
7
of
7
Search:
'("protection" or "protections")'
,
query time: 0.33s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Ransomware
protection
playbook
by
Grimes, Roger A.
Published 2022
Wiley
“
... destructive IT threats and learning about concrete steps that can be taken now to
protect
organizations from...
”
Call Number:
QA76.76.C68
Read Now
2
The true cost of information security breaches and cyber crime
by
Krausz, Michael
Published 2013
IT Governance Pub.
Subjects:
“
...
Protection
de l'information (Informatique) / Aspect économique / Études de cas...
”
Call Number:
QA76.9.A25
Read Now
3
Cyber threat! : how to manage the growing risk of cyber attacks
by
Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents:
“
... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to
Protect
...
”
Call Number:
HD30.2
Read Now
4
Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by
Datt, Samir
Published 2016
Packt Publishing
Table of Contents:
“
... Wireless; Laying the foundation -- IEEE 802.11; Understanding wireless
protection
and security; Wired...
”
Call Number:
TK5105.59
Read Now
5
Enterprise cybersecurity in digital business : building a cyber resilient organization
by
Evans, Ariel
Published 2022
Routledge
“
... reading for CEOs, Chief Information Security Officers, Data
Protection
Officers, Compliance Managers...
”
Call Number:
HD30.37
Read Now
6
Cybersecurity attacks : Red Team strategies : a practical guide to building a penetration testing program having homefield advantage
by
Rehberger, Johann
Published 2020
Packt Publishing
“
... ahead of your adversaries Understand core adversarial tactics and techniques, and
protect
pentesters...
”
Call Number:
QA76.9.A25
Read Now
7
Threat intelligence in practice : a practical guide to threat intelligence from successful organizations
by
Liska, Allan
Published 2018
O'Reilly Media
“
...Many organizations are discovering that traditional security tools alone aren't enough to
protect
...
”
Call Number:
HV6773
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 330 - Economics
Clear Filter
Classification: 338 - Production
Clear Filter
Classification: 364 - Criminology
Year of Publication
From:
To:
Classification
330 - Economics
331 - Labor economics
7
338 - Production
364 - Criminology
658 - General management
4
005 - Computer programming, programs & data
3
more ...
000 - Computer science, information & general works
1
001 - Knowledge
1
see all ...
less ...
Language
English
7
Collection
O'Reilly
7
Author
Datt, Samir
1
Evans, Ariel
1
Grimes, Roger A.
1
Krausz, Michael
1
Liska, Allan
1
Rehberger, Johann
1
more ...
Ulsch, N. MacDonnell
1
Walker, John
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22330+-+Economics%22&filter%5B%5D=dewey-ones%3A%22338+-+Production%22&filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&lookfor=%28%22protection%22+or+%22protections%22%29&type=AllFields
Send by Email
×
Loading...