1
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

2
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ... disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation...

3
by Landoll, Douglas J.
Published 2016
CRC Press
Subjects: ...Data protection / fast...

4
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Subjects: ...Data protection / fast...

6
by Watkins, Steve, Orchiston, Nick
Published 2016
IT Governance Publishing
Subjects: ...Data protection / Standards...

7
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Subjects: ...Data protection / fast...

8
by Iannuzzi, Al
Published 2018
CRC Press
Subjects: ...NATURE / Environmental Conservation & Protection / bisacsh...

9
by Unhelkar, Bhuvan
Published 2011
CRC Press
Subjects: ...Technologie de protection de l'environnement...

10
by Sas, Benedikt
Published 2014
Chandos Publishing, an imprint of Elsevier
Table of Contents: ...; US plant patents versus EU plant variety protection; Inventorship; The patent application; Costs...

11
by Ricks, Truett A.
Published 2015
CRC Press
Table of Contents: ...Part 1. Security and safety planning -- part 2. Infrastructure protection...

12
by Williams, Kevan
Published 2011
Prentice Hall, Pearson
Table of Contents: ...! -- Funding your business -- The people side of your plan -- Protecting your ideas -- How to reduce your plan...

13
by Delaney, Laurel J.
Published 2014
Apress
Table of Contents: ...Legal Protection in the Online EnvironmentDomain Name Protection: Part of Your IP Protection; Other...

14
by Cascarino, Richard
Published 2007
John Wiley & Sons
Table of Contents: ... -- Service center management -- Protection of information assets -- Information assets security management...

15
by Tunley, Martin
Published 2015
John Wiley & Sons
Table of Contents: ...; Sensitive Material; DATA PROTECTION ACT 1998; DPA Terminology; Data Protection Principles; Criminal Offences...

16
by Hoffman, Andrew J., Georg, Susse
Published 2018
Routledge
...-making, accounting, organizational behaviour, and the protection of the natural environment have...

17
by Elliot, Jay
Published 2012
Wiley
Table of Contents: ... for selecting great people -- Unusual interviewing techniques -- To protect innovation, create a company within...

18
by Ferris, Randall W., Murphy, Daniel
Published 2016
Butterworth-Heinemann, an imprint of Elsevier
... workplace violence protection program. The book offers real-life cases studies on how violence...

19
by Barbaroux, Pierre, Attour, Amel, Schenk, Eric
Published 2016
ISTE
Table of Contents: ...; 2.3.1. Patents: protection and knowledge management instruments; 2.3.2. Cooperation agreements...

20
by Roper, Carl
Published 2014
CRC Press
Table of Contents: .... Protecting your data -- chapter 17. Source documents and other resources...