1
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

2
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

3
by Mitchell, Stewart
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

4
by Sarsfield, Steve
Published 2009
IT Governance Pub.
Subjects: ...Protection de l'information (Informatique) / Planification...

5
by Calder, Alan
Published 2005
IT Governance Pub.
Table of Contents: ...; CHAPTER 11 DATA PROTECTION AND PRIVACY; CHAPTER 12 ANTI SPAM LEGISLATION; CHAPTER 13 COMPUTER MISUSE...

6
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Subjects: ...Data protection / fast...

7
by Simmons, Andrea C.
Published 2012
IT Governance Pub.
Table of Contents: ... protection in your organisation?; Of the assets identified, how many servers are there?; What about...

8
by Biegelman, Martin T.
Published 2012
Wiley
Table of Contents: ... : Protecting a company -- Former fraudster and new man -- External schemes and scams : The rest of the fraud...

9
by King, Henry, Afshar, Vala
Published 2024
Wiley
... world, one that optimizes not for the accumulation and protection of resources within controlled...

10
by Gavet, Maelle
Published 2020
John Wiley & Sons, Inc.
Table of Contents: ... -- Modernizing Employment and Labor Protections -- Protecting Privacy and Rethinking Data Ownership -- Fighting...

11
by Childs, Donna R.
Published 2008
Wiley
... occurs, you can take steps to significantly improve the protection of your business in the case of a...

12
Published 2018
Routledge
Table of Contents: ... an "always-on" e-business; 19 Using location k-anonymity models for protecting location privacy; Part V Risk...

13
by Dawson, Steve
Published 2015
Wiley
Table of Contents: ...Element 8. Acting in Good FaithElement 9. Whistle-Blower Protection; Element 10. Suspension...

14
by Swaminathan, Anand, Meffert, Jürgen
Published 2017
Wiley
Table of Contents: ... Data and Analytics to Improve Decision Making -- Protect Critical Infrastructure and Confidential Data...

15
by Miller, Andrew
Published 2014
AMACOM
Table of Contents: ...; The Four Phases of Operational Excellence; Creating Gates: Protecting Your Gains...

16
by McBean, Bill
Published 2012
Wiley
Table of Contents: ...: Protecting Your Company's Assets Should Be Your First Priority; Fact 4: Planning Is About Preparing...

17
Published 2019
Routledge
Table of Contents: ... Baumgartner -- Universal values and the protection of commons : fighting corruption with bottom-up process...

18
by Hewlin, Todd, Snyder, Scott A.
Published 2019
John Wiley & Sons, Inc.
Table of Contents: ... Investment Board; Why Big I Initiatives Need Protection; What Decisions Can Your VIB Make?; Who Should Lead...

19
by Gaughan, Patrick A.
Published 2015
Wiley
Table of Contents: ... on Wealth Transfer Effects -- Protection for Creditors -- Intra-industry Effects of Buyouts -- Chapter 9...

20
by Galpin, Timothy J.
Published 2014
Jossey-Bass
Table of Contents: ... Jeffries -- Failing To Protect Your Investment / Jim Jeffries -- Beware The "Not Invented Here" Syndrome...