Search alternatives:
"protections" » "projections", "protecting"

1
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

2
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

3
by McGovern, Glenn
Published 2011
CRC Press
Subjects: ...Protective custody / fast...

4
by Blackburn, J. Lewis
Published 2014
CRC Press
Table of Contents: ... -- Chapter 5: Relay Input Sources -- Chapter 6: Protection Fundamentals and Basic Design Principles...

5
by Seaman, Jim
Published 2021
Apress
Table of Contents: ...Chapter 1: Introduction -- Chapter 2: What is Protective Security (PS)? -- Chapter 3: Protective...

6
by Sauvanet, Julien, Salerno, Kenneth, Fehling, Markus
Published 2021
IBM Redbooks
...IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery...

7
by Bryant, Joy L.
Published 1999
Academic Press
Table of Contents: ...Choose the right protection -- The types of patents and patent applications -- The invention...

8
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

9
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

10
by Room, Stewart
Published 2021
BCS, The Chartered Institute for IT
Subjects: ...Data protection / Law and legislation / Great Britain...

11
by Ticher, Paul
Published 2015
IT Governance Publishing
Subjects: ...Data protection / fast...

12
by Ticher, Paul
Published 2018
IT Governance Publishing
Subjects: ...Data protection / Law and legislation / European Union countries...

13
Published 2022
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

15
by Schotter, Andreas, Teagarden, Mary
Published 2014
MIT
...According the authors, most of the companies they studied learned to protect their IP through trial...

16
by Sloper, Gary, Hess, Ken
Published 2019
O'Reilly Media
... patterns and provides security professionals with strategies and techniques for preventing and protecting...

17
by Vacca, John R.
Published 2013
Syngress
Table of Contents: ...Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents...

18
by Bahadori, Alireza
Published 2014
Elsevier
Table of Contents: ...Anodes for Internal Cathodic Protection -- 3.11.9. The Type and Number of Anodes Required...

19
by Sandbu, Marius
Published 2023
Packt Publishing, Limited
Table of Contents: ...Protecting the domains -- Protecting the content and URLs -- Other countermeasures -- Summary...

20
by White, Bill, Avill, Robbie, Batta, Sandeep, Kulkarni, Abhiram
Published 2022
IBM Redbooks
... in use, not even the service provider. A TEE can also protect the CI/CD pipeline from bad actors, enforce...