Search alternatives:
"protectionism" » "protections"

1
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

2
by Paquet, Catherine
Published 2005
Cisco Press
Subjects: ...Data protection / fast...

3
by Branigan, Steven
Published 2004
Addison-Wesley Professional
Subjects: ...Data protection / fast...

4
by Dufrasne, Bertrand
Published 2011
IBM Corp.
Subjects: ...Data protection / fast...

5
by Scholz, James A.
Published 2014
CRC Press, Taylor & Francis Group
Subjects: ...Data protection / fast...

6
by Iannuzzi, Al
Published 2018
CRC Press
Subjects: ...NATURE / Environmental Conservation & Protection / bisacsh...

7
by Amaris, Chris
Published 2010
Sams Pub.
Table of Contents: ... reporting -- Data Protection Manager 2010 design, planning, implementation, and administration -- Using Data...

8
by Lowe, Doug
Published 2013
John Wiley & Sons
Table of Contents: ... with servers -- pt. 4. Cloudy with a chance of gigabytes -- pt. 5. Managing and protecting your network -- pt...

9
by Bahadori, Alireza
Published 2013
CRC Press
Table of Contents: .... Foam generating and proportioning systems -- 9. Fire-fighting and fire protection facilities...

10
by McCreary, Dan
Published 2014
Manning
Table of Contents: ... agility with NoSQL -- NoSQL and functional programming -- Security: protecting data in your NoSQL systems...

11
by Biringer, Betty E.
Published 2013
Taylor & Francis
... and a designated federal Sector-Specific Agency to lead protection and resilience-building programs...

12
by Alvarez, Santiago
Published 2006
Cisco Press

13
by Lopp, Michael
Published 2016
Apress
Table of Contents: ...) Bonus: Can your boss? (+1); Do you have well-defined and protected time to be strategic? (+1); Are you...

14
by Dodson, Bryan
Published 2014
John Wiley & Sons
Table of Contents: ...3.1 Variation in engineering design3.2 Propagation of error; 3.3 Protecting designs against...

15
by Yeluri, Raghu, Castro-Leon, Enrique
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... -- The Data Protection Usage Model -- The Run-time Integrity and Attestation Usage Model -- Trusted Cloud...

16
by Nathans, David
Published 2015
Syngress
...Do you know what weapons are used to protect against cyber warfare and what tools to use...

17
by Doro-on, Anna Maricel
Published 2014
CRC Press, Taylor & Francis Group
... analyzing alternatives for protecting underground rail, oil and gas pipelines, pipeline freight...

18
by Stanek, William R.
Published 2005
Microsoft Press
... essential details for using Microsoft SQL Server 2005 to help protect and manage your company's data...

19
by Das, Tapas K.
Published 2020
John Wiley & Sons, Inc.
... between environmental protections, while allowing humans to maintain an acceptable quality of life...

20
by Zikopoulos, Paul
Published 2014
McGraw-Hill Education
... protecting the availability, performance and reliability of essential business applications. In the new era...