Search alternatives:
"protections" » "projections", "protecting"

1
Published 2014
Elsevier
Table of Contents: ... with a number of communication -- Platforms to support public protection and disaster relief (ppdr)...

2
by Reiber, Lee
Published 2016
McGraw-Hill Education
Table of Contents: ..., Protecting, and Seizing Digital Device Evidence -- Before Seizure: Understanding Mobile Device Communication...

3
by Johansen, Gerard
Published 2022
Packt Publishing Ltd.
Table of Contents: ...-volatile evidence -- FTK obtaining protected files -- The CyLR response tool -- Kroll Artifact Parser...

4
Published 2021
Routledge
Table of Contents: ... governance and data protection in India: a critical legal analysis -- Cybersecurity: a national priority...

5
by Carvey, Harlan A.
Published 2014
Syngress
Table of Contents: ... write ups; Digging deeper; Packed files; Digital signatures; Windows File Protection; Alternate data...

6
by Middleton, Bruce
Published 2022
Auerbach Publishers, Incorporated
... to protect our data communications systems, but security threats dictate that they must be all the more...

7
by Bingley, Richard
Published 2024
IT Governance Publishing
... of risk management tactics and strategies to protect yourself against such nefarious threat actors...