Search alternatives:
corruption » correction

1
by Arbogast, Stephen
Published 2017
Wiley-Scrivener
...Resisting Corporate Corruption teaches business ethics in a manner very different from...

2
by Butter, Michael
Published 2023
Taylor & Francis
Subjects: ...Authoritarian;China;Chinese;Communist;Conspiracy Theories;Conspiracy Theory;Corona;Corruption;Covid...

3
by Ebbers, Mike
Published 2013
IBM Corp., International Technical Support Organization
Subjects: ...Corporations / Corrupt practices / fast...

4
by de Andres Sanchez, Jorge
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...corruption normalization...

5
by Russo, Alessio
Published 2021
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...corruption...

6
by Rokicki, Tomasz
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...corruption...

7
by Pardo, Leandro
Published 2019
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...corrupted data...

8
by Helfaya, Akrum
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...anti-corruption disclosure...

9
by Jódar, Lucas
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...political corruption...

10
by Clayton, Nick
Published 2019
IBM Redbooks
... utilization. The paper introduces Safeguarded Copy and discusses the need for logical corruption protection...

11
by Mehta, Asha
Published 2022
John Wiley & Sons, Incorporated
Table of Contents: ...Chapter 4 Submerging Markets? Corruption and Autocracy: Romania's Unexpected Rise and the Role...

12
by Seminars, Total, Meyers, Mike, Lachance, Daniel
Published 2021
Packt Publishing
... in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup...

13
by Knop, Felipe, Patil, Sandeep, Kantawala, Alifiya, Coyne, Larry
Published 2018
IBM Redbooks
... of unauthorized disclosure of data, prevention of data tampering, and accidental corruption. This process ensures...

17
by Karande, Chetan
Published 2018
O'Reilly Media
... attackers to obtain, corrupt, or destroy server contents...