Search alternatives:
"protectionism" » "protection"

1
by Moyo, Siegfried
Published 2022
Wiley
Subjects: ...Data protection / fast...

2
by Cappelli, Dawn
Published 2012
Addison-Wesley
Subjects: ...Data protection / fast...

3
by Krausz, Michael
Published 2013
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Aspect économique / Études de cas...

4
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect...

5
by Messier, Ric
Published 2014
Syngress
Table of Contents: ...; Data destruction; Infrastructure; Protecting yourself; Encryption; Data loss prevention; Conclusion...

6
by Coden, Michael, Reeves, Martin, Pearlson, Keri, Madnick, Stuart
Published 2023
MIT Sloan Management Review
...Most organizations put more resources toward identification, protection, and detection rather than...

7
by Rehberger, Johann
Published 2020
Packt Publishing
... ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters...

8
by Cole, Eric
Published 2021
Tantor Media, Inc.
... background can implement, including steps to take on a daily, weekly, and monthly basis to protect...

9
by Evans, Ariel
Published 2022
Routledge
... reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers...

10
by Sullivan, Kevin
Published 2015
Apress, Distributed to the Book trade worldwide by Springer
..., and prosecutors in following up on reports, catching launderers, and protecting the integrity and reputations...

11
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
... be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways...