Search alternatives:
"protectionism" » "protection"

1
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

2
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect...

3
by Coden, Michael, Reeves, Martin, Pearlson, Keri, Madnick, Stuart
Published 2023
MIT Sloan Management Review
...Most organizations put more resources toward identification, protection, and detection rather than...

4
by Rehberger, Johann
Published 2020
Packt Publishing
... ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters...

5
by Evans, Ariel
Published 2022
Routledge
... reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers...

6
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
... be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways...

7
by Sullivan, Kevin
Published 2015
Apress, Distributed to the Book trade worldwide by Springer
..., and prosecutors in following up on reports, catching launderers, and protecting the integrity and reputations...