Search alternatives:
"protectionism" » "protections"

61
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

62
Published 2023
Apress
Subjects: ...Data protection / fast...

63
by Haber, Morey J.
Published 2020
Apress
Subjects: ...Data protection / fast...

64
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10...

66
by Calder, Alan
Published 2005
IT Governance Pub.
Subjects: ...Data protection / fast...

67
by Wall, Tyler
Published 2021
Apress
Subjects: ...Data protection / fast...

68
by Williams, Branden R., Chuvakin, Anton A.
Published 2015
Syngress
Table of Contents: ... network -- Strong access controls -- Protecting cardholder data -- Using wireless networking...

69
by O'Hanley, Richard
Published 2014
CRC Press
Table of Contents: ...; Security Awareness Training; 12. Protecting Us from Us: Human Firewall Vulnerability Assessments; Ken M...

70
by Shema, Mike
Published 2014
McGraw-Hill Education
Table of Contents: ... Filter vs. Firewall -- How a Firewall Protects a Network -- Packet Characteristics to Filter -- Stateless...

71
by Calles, Miguel A.
Published 2020
Apress
Table of Contents: ...: Monitoring Security Events -- Chapter 10: Protecting Sensitive Data -- Chapter 11: Monitoring, Auditing...

72
by Brotby, W. Krag
Published 2013
CRC Press
Subjects: ...Data protection / fast...

73
by Windley, Phillip J.
Published 2023
O'Reilly Media, Inc.
Subjects: ...Data protection / fast...

74
Published 2018
John Wiley & Sons
Table of Contents: ... system -- Privacy protection for cloud-based robotic networks -- Network coding technique : security...

75
by Nascimento, Adolfo Eloy
Published 2017
Packt Publishing
Table of Contents: ... to do it... -- How it works... -- See also -- Chapter 3: Using OAuth 2.0 Protected APIs -- Introduction...

77
by Camargo, Julio Cesar Bueno de
Published 2022
Packt Publishing, Limited
... how to apply web browsing controls and website protection Leverage Sensei to implement next-generation...

78
by Haustein, Nils, Gomez, Jose M., Forsyth, Benjamin C.
Published 2019
IBM Corporation, International Technical Support Organization
... systems can be protected or shared by replicating these files to another file system that is in a remote...

79
by Bowman, Ronald H.
Published 2008
John Wiley & Sons
Table of Contents: ... and Consequences -- 9. Government's Role: Summary of National Infrastructure Protection Plan of 2006 -- 10. Tier 4...

80
by Mitchell, Stewart
Published 2009
IT Governance Pub.
Subjects: ...Data protection / fast...