Search alternatives:
"protectionism" » "protections"

21
by Lamb, John P.
Published 2009
IBM Press/Pearson
Subjects: ...Technologie de protection de l'environnement...

22
by Tang, Hansong
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...Ocean Protection Plan...

23
by Signorelli, Santiago
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...sun chemical protectants...

24
by Ramos, Helena M.
Published 2021
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...fish protection...

25
by Stankovic, Milan
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...bud protection...

26
by Stankovic, Milan
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...bud protection...

27
by Stankovic, Milan
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...bud protection...

28
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ...How the Internet works -- How hackers break into your PC and how to protect against them -- How...

29
by Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents: ...Forefront Unified Access Gateway 2010Forefront Identity Manager; Forefront Protection for Exchange...

30
by Szor, Peter
Published 2005
Addison-Wesley
Table of Contents: ...-protection strategies -- Advanced code evolution techniques and computer virus generator kits...

31
by Habraken, Joseph W.
Published 2006
Sams
Table of Contents: ... -- Protecting and securing the wireless network...

32
by Amaris, Chris
Published 2010
Sams Pub.
Table of Contents: ... reporting -- Data Protection Manager 2010 design, planning, implementation, and administration -- Using Data...

33
by Sharp, John
Published 2010
Microsoft/O'Reilly
Table of Contents: ...; Implementing Security in a Windows Domain; Protecting a TCP Service at the Message Level; Protecting an HTTP...

34
by Grimes, Roger A.
Published 2007
Wiley Technology Pub.
Table of Contents: .... Application security -- 7. Vista client protection -- pt. III. Securing Internet and e-mail access -- 8...

35
by Datta, Arun
Published 2014
CRC Press
Table of Contents: ... protection -- Chapter 8. Glycol dehydration...

36
by Lowe, Doug
Published 2013
John Wiley & Sons
Table of Contents: ... with servers -- pt. 4. Cloudy with a chance of gigabytes -- pt. 5. Managing and protecting your network -- pt...

37
by Mathews, Craig F.
Published 2004
Que
Table of Contents: ... applications -- Data communication and protection -- Using other included and free applications -- Using...

38
by Bahadori, Alireza
Published 2013
CRC Press
Table of Contents: .... Foam generating and proportioning systems -- 9. Fire-fighting and fire protection facilities...

39
by Silberschatz, Abraham
Published 2005
J. Wiley & Sons
Table of Contents: ...-storage structure -- I/O systems -- Protection -- Security -- Distributed system structures -- Distributed...

40
by McCreary, Dan
Published 2014
Manning
Table of Contents: ... agility with NoSQL -- NoSQL and functional programming -- Security: protecting data in your NoSQL systems...