Search alternatives:
"protectionism" » "protections"

1
by Peltier, Thomas R.
Published 2014
CRC Press, Taylor & Francis Group
Subjects: ...Data protection / fast...

2
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

3
by Calder, Alan
Published 2013
IT Governance Pub.
Subjects: ...Data protection / Standards...

4
by Calder, Alan, Williams, Geraint
Published 2015
IT Governance Publishing
Subjects: ...Data protection / Standards...

5
by Calder, Alan, Williams, Geraint
Published 2015
IT Governance Publishing
Subjects: ...Data protection / Standards...

6
by Speed, Tim
Published 2003
Digital Press
Table of Contents: ...The Internet and Security; The Security Review Process; Cryptography; Secure Networks; Protecting...

7
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ..., and PKI -- pt. II. Privacy and security for users. The Web's war on your privacy -- Privacy-protecting...

8
by Wooldridge, Dave
Published 2011
Apress
Table of Contents: ... Protection; Patents; Is Your Invention Patentable?; Avoiding the On Sale Bar; How to File for a Patent...

9
by Wooldridge, Dave
Published 2010
Apress
Table of Contents: ...; Chapter 3 Protecting YourIntellectual Property; Chapter 4 Your iPhone App Is Your Most Powerful Marketing...

10
by Boyce, Jim
Published 2007
Microsoft Press
Table of Contents: ... outlook data -- Security and virus protection -- Delegating responsibilities to an assistant -- Sharing...

11
by Jeschke, Egbert
Published 2012
Microsoft Press
Table of Contents: ...; Converting Existing Values; Protecting Formulas; Hiding Formulas; Specifying the Formula Calculation Type...