1
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

2
by Bari, Paola
Published 2005
IBM, International Support Organization
Table of Contents: ...Chapter 1. APPC Protected Conversation introduction and theory -- Chapter 2. Upgrading your...

3
by Henriksen, Nicolai
Published 2016
Packt

4
by Lovelace, Mary
Published 2014
IBM Corp., International Technical Support Organization

5
by Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents: ... Protection for Exchange Server; Understanding Forefront Protection for Exchange Server; Architecture...

6
by Ganger, Devin L.
Published 2008
Wiley Pub.
Subjects: ...Data protection manager / http://id.loc.gov/authorities/names/n2007075165...

7
by Gucer, Vasfi
Published 2007
IBM, International Technical Support Organization
...Tivoli continuous data protection for files V3.1...

8
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

9
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10...

10
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

11
by Nickel, Jochen
Published 2019
Packt Publishing
... protection strategies Design and deploy custom Identity and access management solutions Build a complete...

12
by Taylor, Andy
Published 2008
British Computer Society
Subjects: ...Protection de l'information (Informatique) / Gestion / Examens / Guides de l'étudiant...

13
by Paquet, Catherine
Published 2005
Cisco Press
Subjects: ...Data protection / fast...

14
by Mutch, John
Published 2011
Apress
Table of Contents: ... and Hackers Alike -- Chapter 6: Protecting Virtual Environments from Hypervisor Sabotage -- Chapter 7: Secure...

15
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... and Two-Factor Authentication; Bigger Can Be Better. . .; Mix It Up; Protecting Passwords; What Should You...

16
by Schilling, Christian O.
Published 2014
Mitp
Subjects: ...Data protection / fast...

17
by Branigan, Steven
Published 2004
Addison-Wesley Professional
Subjects: ...Data protection / fast...

18
by Dufrasne, Bertrand
Published 2011
IBM Corp.
Subjects: ...Data protection / fast...

19
by Uceda Vélez, Tony, Morana, Marco M.
Published 2015
John Wiley & Sons
Subjects: ...Data protection / fast...

20
by Cappelli, Dawn
Published 2012
Addison-Wesley
Subjects: ...Data protection / fast...