41
by King, Henry, Afshar, Vala
Published 2024
Wiley
... world, one that optimizes not for the accumulation and protection of resources within controlled...

42
by Bott, Frank
Published 2005
British Computer Society
Table of Contents: ... Rights; 14 Data Protection, Privacy and Freedom of Information; 15 Internet Issues...

43
by Ferris, Randall W., Murphy, Daniel
Published 2016
Butterworth-Heinemann, an imprint of Elsevier
... workplace violence protection program. The book offers real-life cases studies on how violence...

44
by Kovacich, Gerald L.
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ... FRAUD-RELATED LAWS -- RELEVANT CONSUMER PROTECTION LAWS FOR FRAUD IN THE UNITED STATES -- A FEW EXAMPLES...

45
by Ohlhorst, Frank
Published 2013
John Wiley & Sons
Table of Contents: ..., Compliance, Auditing, and Protection; Pragmatic Steps to Securing Big Data; Classifying Data; Protecting Big...

46
by Kendrick, Rupert
Published 2010
IT Governance Pub.
... security and data protection, the author combines his legal expertise with a solid, practical grasp...

47
by Barbaroux, Pierre, Attour, Amel, Schenk, Eric
Published 2016
ISTE
Table of Contents: ...; 2.3.1. Patents: protection and knowledge management instruments; 2.3.2. Cooperation agreements...

48
by Roper, Carl
Published 2014
CRC Press
Table of Contents: .... Protecting your data -- chapter 17. Source documents and other resources...

49
by Raghavan, Ram
Published 2011
Chandos Pub.
Table of Contents: ... to practical HR; Practical HR; Value addition and value protection...

50
by Rowe, Sandra F.
Published 2015
Management Concepts Press
Table of Contents: ... Project Communications; PLANNING PROCESS GUIDE FOR SIMPLE PROTECTS; Chapter 9 Controlling; Controlling...

51
by Cook, Thomas A., Raia, Kelly
Published 2017
AMACOM
Table of Contents: ... and Secure" Inbound Supply Chain; 12 Bureau of Customs and Border Protection: Compliance and Security...

52
by Nolan-Brown, Patricia
Published 2014
AMACOM
Table of Contents: ... -- Protect it (step three): keep thieves away -- Pitch it (step four): make 'em want it bad -- Make it (step...

53
by Austin, Robert D.
Published 2003
Financial Times/Prentice Hall
Table of Contents: ... Uncertainty Instead of Protecting Against It -- McDonald's French Fries, Various Cattle, and Urgent Customer...

54
by Young, Carl S.
Published 2010
Syngress/Elsevier
... to information protection, electromagnetic pulse, biological, chemical and radiological weapons, theft...

55
by Phillips, Jack J., Phillips, Patricia Pulliam
Published 2015
American Management Association
Table of Contents: ... Protect the Environment: Implementing Green, Sustainable Projects; 13 Build Global Leaders: Developing...

56
by Ilag, Balu N.
Published 2018
Apress
Table of Contents: ...; Security and Compliance; Enabling Information Protection; Using Information Protection Flow; Auditing...

57
by Tynan, Katy
Published 2015
CRC Press
... Factor 1-The Great Recession Factor 2-Employer to Enemy Factor 3-The Patient Protection and Affordable...

58
by Gavet, Maelle
Published 2020
John Wiley & Sons, Inc.
Table of Contents: ... -- Modernizing Employment and Labor Protections -- Protecting Privacy and Rethinking Data Ownership -- Fighting...

59
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Protecting the information infrastructure / Franklin Platt -- Operating system security / William...

60
by Litow, Stanley S.
Published 2018
John Wiley & Sons, Inc.
... long-term bottom line benefit - Protect and enrich brand value- Recruit and retain top talent Perfect...