1
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

2
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

3
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

4
by Barringer, Bruce R.
Published 2011
FTPress Delivers

5
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

6
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

7
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

8
by Lipman, Frederick D.
Published 2012
Wiley
Table of Contents: ... Tam Cases -- IRS Whistleblowers -- Other Statutory Incentives and Protections for Whistleblowers -- A...

9
by Brown, Karen A., Hyer, Nancy Lea, Ettenson, Richard
Published 2017
MIT Sloan Management Review

10
by Rinaldo, Carlotta
Published 2020
Routledge
..."Business Negotiations and the Law: The Protection of Weak Professional Parties in Standard Form...

11
by Weisman, Steve
Published 2010
Pearson Education Pub. as FTPress Delivers
...Thirty-one simple rules for protecting your IRAs and 401(k)s...

12
by Watkins, Steve
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

13
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

14
by Duening, Thomas N.
Published 2010
Academic Press

15
by Wood, Phillip
Published 2012
IT Governance Pub.

16
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... to Protect Against a DDoS Attack; 2.4.3 Intensity of Attack; 2.4.4 Duration of DDoS Attacks; 2.4.5 Repeat...

17
by Myers, Kenneth N.
Published 2006
Wiley
Table of Contents: ...BUSINESS CONTINUITY STRATEGIES: PROTECTING AGAINST UNPLANNED DISASTERS; CONTENTS; PREFACE; Chapter...

18
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ... disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation...

19
Published 2018
O'Reilly Media, Inc.

20
by Sharma, Sanjay
Published 2020
John Wiley & Sons, Inc.
Subjects: ...Data protection / fast...