Search alternatives:
"protectionism" » "protections"

1
Published 1998
National Academy Press

2
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

3
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

4
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

5
by Limited, Assemble You
Published 2022
Assemble You
... of protecting your team, when you should do it and what they may need protection from. It's all about ensuring...

7
by Gaschler, Andre
Published 2019
IBM Corporation, IBM Redbooks
...Spectrum Protect Plus...

8
by Sloper, Gary, Hess, Ken
Published 2019
O'Reilly Media
... patterns and provides security professionals with strategies and techniques for preventing and protecting...

9
by White, Bill, Avill, Robbie, Batta, Sandeep, Kulkarni, Abhiram
Published 2022
IBM Redbooks
... in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce...

10
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

12
by Bari, Paola
Published 2005
IBM, International Support Organization
Table of Contents: ...Chapter 1. APPC Protected Conversation introduction and theory -- Chapter 2. Upgrading your...

13
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

14
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

15
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

16
by Gucer, Vasfi
Published 2006
IBM Corp. International Technical Support Organization
...Tivoli continuous data protection for files...

17
by Henriksen, Nicolai
Published 2016
Packt

18
by Santos, Omar
Published 2017
Cisco Press
..."Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco...

19
by Dalziel, Henry
Published 2015
Elsevier, Syngress
Table of Contents: ... The principle of least priviledge ; 3.2 Detection's folly -- ch. 4. Protection's weak link : 4.1 Desktop...

20
by Burnett, Mark
Published 2006
Syngress