Search alternatives:
"protectionism" » "protections"

1
by Seaman, Jim
Published 2021
Apress
Table of Contents: ...Chapter 1: Introduction -- Chapter 2: What is Protective Security (PS)? -- Chapter 3: Protective...

2
by Blackburn, J. Lewis
Published 2014
CRC Press
Table of Contents: ... -- Chapter 5: Relay Input Sources -- Chapter 6: Protection Fundamentals and Basic Design Principles...

3
by McGovern, Glenn
Published 2011
CRC Press
Subjects: ...Protective custody / fast...

4
by Sauvanet, Julien, Salerno, Kenneth, Fehling, Markus
Published 2021
IBM Redbooks
...IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery...

5
by Room, Stewart
Published 2021
BCS, The Chartered Institute for IT
Subjects: ...Data protection / Law and legislation / Great Britain...

6
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

7
by Ticher, Paul
Published 2015
IT Governance Publishing
Subjects: ...Data protection / fast...

8
by Ticher, Paul
Published 2018
IT Governance Publishing
Subjects: ...Data protection / Law and legislation / European Union countries...

9
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

10
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

11
by Bryant, Joy L.
Published 1999
Academic Press
Table of Contents: ...Choose the right protection -- The types of patents and patent applications -- The invention...

12
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

13
Published 2022
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

14
by Limited, Assemble You
Published 2022
Assemble You
... of protecting your team, when you should do it and what they may need protection from. It's all about ensuring...

15
by Jay, Rosemary
Published 2010
IT Governance Pub.
Table of Contents: ...?; chapter 5: understanding and applying data protection principles 1 to 6; chapter 6: security obligations...

17
by Gaschler, Andre
Published 2019
IBM Corporation, IBM Redbooks
...Spectrum Protect Plus...

18
by Lallement, Rémi
Published 2017
ISTE
Table of Contents: ...Front Matter -- The Rationale of the System and the Diversity of the Forms of Protection -- How...

19
by Schotter, Andreas, Teagarden, Mary
Published 2014
MIT
...According the authors, most of the companies they studied learned to protect their IP through trial...

20
by Bahadori, Alireza
Published 2014
Elsevier
Table of Contents: ...Anodes for Internal Cathodic Protection -- 3.11.9. The Type and Number of Anodes Required...