Home > Tags: protection (Total 79 Records)
Microsoft System Center Endpoint Protection Cookbook - Second Edition
Microsoft Office By:Nicolai Henriksen 2016-12-19 00:00:00
If you are a System Administrator or Engineer using System Center 2016 Endpoint Protection, then this book is for you. You should have a good background with Microsoft products in general, although no knowledge of Endpoint Protection is required. System Center Configuration Manager is now used by o Microsoft Office
Online Banking Security Measures and Data Protection (Advances in Information Security, Privacy, and Ethics)
Security By:Shadi A. Aljawarneh 2016-09-23 00:00:00
Technological innovations in the banking sector have provided numerous benefits to customers and banks alike however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Prot Security
Tags: security data information online privacy protection ethics measures banking
Microsoft Data Protection Manager 2010
Microsoft Office By:Steve Buchanan 2011-05-23 00:00:00
This book is a practical, step-by-step tutorial to planning deployment, installing, configuring, and troubleshooting Data Protection Manager 2010. It will take you through all the steps required to use DPM to effectively back up your business data. If you are a Network Administrator, System Administ Microsoft Office
Tags: microsoft data manager protection
Advances in Artificial Intelligence for Privacy Protection and Security (Intelligent Information Systems)
Security By:Agusti Solanas 2009-09-30 00:00:00
In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fie Security
Tags: security information system intelligence artificial privacy protection intelligent
Cyber Infrastructure Protection: Vol. III
Security By:U.S. Department of Defense 2017-06-21 00:00:00
Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management ( Security
Tags: infrastructure cyber protection
Cryptology Transmitted Message Protection: From Deterministic Chaos up to Optical Vortices (Signals and Communication Technology)
Telecommunications By:Igor Izmailov 2016-07-30 00:00:00
Authors: Izmailov, I., Poizner, B., Romanov, I., Smolskiy, S. Presents basics of traditional cryptography and communication protection Explains electronic and optical chaotic generators Discusses the application of chaos theory to information protection This book presents methods to improve informa deterministic chaos, information security, chaos theory, optical chaotic generators, cryptology transmitted message
Tags: signal optical communication technology cryptology protection message deterministic chaos transmitted vortices
Windows 10 Configuring (70-697): Manage Data Access and Protection
Certification By:Pluralsight 2014-00-00 00:00:00
Windows 10 Configuring (70-697): Manage Data Access and Protection MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3h 16m | 443 MB Genre: eLearning | Language: English This course, fourth in a series of nine courses on Windows 10, covers one of the main objective areas in the 70-697 ce manage data access, main objective areas, 70-697 certification exam, prime management tool, home groups libraries
Tags: data access windows configuring manage protection
Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, ... in Information and Communication Technology)
Computer Science By:Tyler Moore 2010-12-23 00:00:00
The information infrastructure comprising computers, embedded devices, networks and software systems is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, pub critical infrastructure protection, annual ifip wg, government facilities.critical infrastructure, inf- mation technology, commercial nuclear reactors
Tags: information communication technology infrastructure annual protection critical conference ifip iccip
Critical Infrastructure Protection Research: Results of the First Critical Infrastructure Protection Research Project in Hungary (Topics in Intelligent Engineering and Informatics)
Computer Science By:Laszlo Nadai and Jozsef Padanyi 2016-01-21 00:00:00
This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing t critical infrastructure protection, infrastructure protection research, protection research project, infrastructure protection researches, public service.critical infrastructure
Tags: project engineering informatics result infrastructure topic research protection intelligent critical hungary
Privacy Protection and Computer Forensics, Second Edition
Computer Science By:Michael A. Caloyannides 2004-10-30 00:00:00
This revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the artech house bestseller, detailed how-to guidance, ancillary computing devices, hostile computer forensics, typical computer forensics
Tags: computer forensics privacy protection