Search alternatives:
"protectionism" » "protections"

1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
by Sloper, Gary, Hess, Ken
Published 2019
O'Reilly Media
... patterns and provides security professionals with strategies and techniques for preventing and protecting...

3
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.

4
by Hayden, Lance
Published 2010
McGraw Hill
Subjects: ...Data protection / Evaluation...

5
by Windley, Phillip J.
Published 2023
O'Reilly Media, Inc.
Subjects: ...Data protection / fast...

6
by McDonough, Bart R.
Published 2019
Gildan
...From Bart McDonough, an accessible guide to protecting your digital life and your family online...

7
by Windley, Phillip J.
Published 2005
O'Reilly
Subjects: ...Data protection / fast...

8
by Krausz, Michael
Published 2010
IT Governance Pub.
Subjects: ...Data protection / fast...

9
by Moyo, Siegfried
Published 2022
Wiley
Subjects: ...Data protection / fast...

10 Subjects: ...Data protection / fast / (OCoLC)fst00887958...

11
by Cappelli, Dawn
Published 2012
Addison-Wesley
Subjects: ...Data protection / fast...

12
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

13
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ...How the Internet works -- How hackers break into your PC and how to protect against them -- How...

14
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect...

15
by Loewengart, Victoria
Published 2012
IT Governance Pub.
Table of Contents: ... 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet...

16
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... Wireless; Laying the foundation -- IEEE 802.11; Understanding wireless protection and security; Wired...

17
by Winkler, Ira
Published 2007
Syngress
Table of Contents: ...Educate YourselfRemember, You are Protecting Information; Protecting Your Computer; Note...

18
by Evans, Ariel
Published 2022
Routledge
... reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers...

19
by Grobman, Steve, Cerra, Allison
Published 2016
Apress, Distributed by Springer Science+Business Media New York

20
by Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents: ... Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System...