Search alternatives:
"protectionism" » "protections"

1
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

2
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

3
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

4
by Sloper, Gary, Hess, Ken
Published 2019
O'Reilly Media
... patterns and provides security professionals with strategies and techniques for preventing and protecting...

6
by Limited, Assemble You
Published 2022
Assemble You
... of protecting your team, when you should do it and what they may need protection from. It's all about ensuring...

7
by White, Bill, Avill, Robbie, Batta, Sandeep, Kulkarni, Abhiram
Published 2022
IBM Redbooks
... in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce...

8
by Gaschler, Andre
Published 2019
IBM Corporation, IBM Redbooks
...Spectrum Protect Plus...

9
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

10
by Bari, Paola
Published 2005
IBM, International Support Organization
Table of Contents: ...Chapter 1. APPC Protected Conversation introduction and theory -- Chapter 2. Upgrading your...

12
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

13
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

14
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

15
by Henriksen, Nicolai
Published 2016
Packt

16
by Gucer, Vasfi
Published 2006
IBM Corp. International Technical Support Organization
...Tivoli continuous data protection for files...

17
by Santos, Omar
Published 2017
Cisco Press
..."Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco...

18
by Dalziel, Henry
Published 2015
Elsevier, Syngress
Table of Contents: ... The principle of least priviledge ; 3.2 Detection's folly -- ch. 4. Protection's weak link : 4.1 Desktop...

19
Published 2008
Microsoft, Inc.
Subjects: ...Data protection manager / http://id.loc.gov/authorities/names/n2007075165...

20
by Lovelace, Mary
Published 2014
IBM Corp., International Technical Support Organization