Search alternatives:
"protectionism" » "protections"

1
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

2
by Paquet, Catherine
Published 2005
Cisco Press
Subjects: ...Data protection / fast...

3
by Branigan, Steven
Published 2004
Addison-Wesley Professional
Subjects: ...Data protection / fast...

4
by Drabick, Rodger
Published 2013
Addison-Wesley Professional
Subjects: ...Data protection / fast...

5
by Rice, William E. Perry. Randall W.
Published 2013
Addison-Wesley Professional
Subjects: ...Data protection / fast...

6
by Dufrasne, Bertrand
Published 2011
IBM Corp.
Subjects: ...Data protection / fast...

7
by Lowe, Doug
Published 2013
John Wiley & Sons
Table of Contents: ... with servers -- pt. 4. Cloudy with a chance of gigabytes -- pt. 5. Managing and protecting your network -- pt...

8
by Biringer, Betty E.
Published 2013
Taylor & Francis
... and a designated federal Sector-Specific Agency to lead protection and resilience-building programs...

9
by Alvarez, Santiago
Published 2006
Cisco Press

10
by Mason, Brian
Published 2012
Packt Pub.
Table of Contents: ... ... ; There's more ... ; Offloading the SUP; Offloading Endpoint Protection; Offloading SQL Reporting Services; See...

11
by White, Bill
Published 2020
IBM Redbooks
... integration services Securing and protecting data with encryption everywhere Providing resilience with key...

12
by Hay, Andrew
Published 2009
Syngress Pub.