Search alternatives:
"protectionism" » "protection"

1
by Lowe, Doug
Published 2013
John Wiley & Sons
Table of Contents: ... with servers -- pt. 4. Cloudy with a chance of gigabytes -- pt. 5. Managing and protecting your network -- pt...

2
by Trivedi, Vinay
Published 2014
Apress
Table of Contents: ... and understand your users -- 11. Performance and scalability -- 12. Security threats: To defend and protect...

3
by Lagraña, Fernando
Published 2016
ISTE, Ltd.
Table of Contents: ... -- Exposure to Spam and Protection Strategies / Fernando Lagraña -- Concluding Recommendations -- Bibliography...

4
by Ryan, Julie JCH, Kamachi, Cade
Published 2015
Syngress
... to differentiate malicious email from benign email, and suggests protective strategies for both personal...

5
by Sammons, Peter
Published 2018
Routledge
... rights: how they are created, transferred and protected. He sets out some alternative strategies...