Search alternatives:
"protectionism" » "protections"

61
by Alvarez, Santiago
Published 2006
Cisco Press

62
by Norberg, Stefan
Published 2001
O'Reilly
... system (known as a "bastion host") is as secure as it can be. Providing extra security protection...

63
by Zhironkin, Sergey
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
... protection, and geo-ecology. A special place among them is given to post-mining technologies research....

64
by Morimoto, Rand
Published 2010
Sams
Table of Contents: ...-level security -- Security policies, network policy server, and network access protection -- Migrating...

65
Published 2013
CRC Press

66
by Morris, James E.
Published 2013
CRC Press, Taylor & Francis
Table of Contents: ... of protective layers on silver metallic nanoparticles for ink-jet printing technique / Andrzej Moscicki, Anita...

67
by Shao, Songdong
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
... ulterior uncertainties for the accurate and efficient management of these areas to protect the environment...

68
by Sutton, Ian
Published 2015
GPP
Table of Contents: ...; Nonprocess Operations; Outside Storage; Coal and Coke Storage; Drum Storage; Drainage; Fire Protection...

69
by Helwegen, Wim
Published 2012
CRC Press
Table of Contents: .... Laurþen; Obtaining Patent Protection in Europe; Post-Grant Proceedings for a European Patent...

70
by Cowart, Robert
Published 2010
Que
Table of Contents: ...pt. VII. Security -- 30. Protecting Windows from viruses and spyware -- Malicious software...

71
by Alamanni, Marco
Published 2015
Packt Publishing
Table of Contents: ... and the Infrastructure""; ""Attacks against Wi-Fi Protected Setup""; ""Reaver""; ""Attacking WPA-Enterprise""; ""Setting...

72
by Raab, Stefan
Published 2005
Cisco Press
Table of Contents: ... -- Replay Protection Methods -- Mobile Node and Foreign Agent Authentication and Challenge Mechanism -- FA...

73
by Regalado, Daniel
Published 2015
McGraw-Hill Education
... and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web...

74
by Trivedi, Vinay
Published 2019
Springer Nature
Table of Contents: ...; Integrity; Availability; Precautions; Encryption; Password Protection; Means of Authentication; Network...

75
by Crawley, Frank, Tyler, Brian
Published 2015
Elsevier
Table of Contents: ... Consequences; 4.5 Safeguards (Protection); 4.6 Risk Assessment; 4.7 Recommendations/Actions; 4.8 Recording; 4.9...

76
by Lopp, Michael
Published 2016
Apress
Table of Contents: ...) Bonus: Can your boss? (+1); Do you have well-defined and protected time to be strategic? (+1); Are you...

77
by Dodson, Bryan
Published 2014
John Wiley & Sons
Table of Contents: ...3.1 Variation in engineering design3.2 Propagation of error; 3.3 Protecting designs against...

78
by Crane, Dave
Published 2006
Manning
Table of Contents: ... -- 7.2. Communicating with remote services -- 7.3. Protecting confidential data -- 7.4. Policing access...

79
by Shoup, Kate
Published 2008
Wiley Pub.
Table of Contents: ... Security Settings -- Protect Your Privacy -- Change Wi-Fi Settings -- Ch. 10. Accessing Other Web Content...

80
Published 2021
CRC Press
Table of Contents: ... -- User access and provisioning -- Data protection and breaches...