1
by Seaman, Jim
Published 2021
Apress
Table of Contents: ...Chapter 1: Introduction -- Chapter 2: What is Protective Security (PS)? -- Chapter 3: Protective...

2
by McGovern, Glenn
Published 2011
CRC Press
Subjects: ...Protective custody / fast...

3
by Blackburn, J. Lewis
Published 2014
CRC Press
Table of Contents: ... -- Chapter 5: Relay Input Sources -- Chapter 6: Protection Fundamentals and Basic Design Principles...

4
by Sauvanet, Julien, Salerno, Kenneth, Fehling, Markus
Published 2021
IBM Redbooks
...IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery...

5
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

6
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

7
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

8
by Room, Stewart
Published 2021
BCS, The Chartered Institute for IT
Subjects: ...Data protection / Law and legislation / Great Britain...

9
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

10
by Bryant, Joy L.
Published 1999
Academic Press
Table of Contents: ...Choose the right protection -- The types of patents and patent applications -- The invention...

11
by Ticher, Paul
Published 2015
IT Governance Publishing
Subjects: ...Data protection / fast...

12
by Ticher, Paul
Published 2018
IT Governance Publishing
Subjects: ...Data protection / Law and legislation / European Union countries...

13
Published 2022
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

15
by Sandbu, Marius
Published 2023
Packt Publishing, Limited
Table of Contents: ...Protecting the domains -- Protecting the content and URLs -- Other countermeasures -- Summary...

16
by Limited, Assemble You
Published 2022
Assemble You
... of protecting your team, when you should do it and what they may need protection from. It's all about ensuring...

17
by White, Bill, Avill, Robbie, Batta, Sandeep, Kulkarni, Abhiram
Published 2022
IBM Redbooks
... in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce...

18
by Bahadori, Alireza
Published 2014
Elsevier
Table of Contents: ...Anodes for Internal Cathodic Protection -- 3.11.9. The Type and Number of Anodes Required...

19
by Schotter, Andreas, Teagarden, Mary
Published 2014
MIT
...According the authors, most of the companies they studied learned to protect their IP through trial...

20
by Sloper, Gary, Hess, Ken
Published 2019
O'Reilly Media
... patterns and provides security professionals with strategies and techniques for preventing and protecting...