121
by Hewlin, Todd, Snyder, Scott A.
Published 2019
John Wiley & Sons, Inc.
Table of Contents: ... Investment Board; Why Big I Initiatives Need Protection; What Decisions Can Your VIB Make?; Who Should Lead...

122
by Gordon, Jon, Kelly, Amy
Published 2018
John Wiley & Sons, Inc.
Table of Contents: ... -- Protection from Energy Vampires -- Energy Vampires: A Word of Caution -- Dealing with Energy Vampires...

123
by Brosseau, Denise
Published 2013
Jossey-Bass
Table of Contents: ... Name; Show Proof That It Works; Protect and Control Your IP; Codify Your Lessons Learned: A Quick...

124
by Gaughan, Patrick A.
Published 2015
Wiley
Table of Contents: ... on Wealth Transfer Effects -- Protection for Creditors -- Intra-industry Effects of Buyouts -- Chapter 9...

125
by Marr, Bernard, Ward, Matt
Published 2019
Wiley
Table of Contents: .... Apple : integrating AI into products and protecting user privacy -- 5. Baidu : machine learning...

126
by Grau, David
Published 2014
John Wiley & Sons Inc.
Table of Contents: ... -- Recruiting Next-Generation Talent to Grow Your Business -- Preserving and Protecting What You've Built...

127
by Galpin, Timothy J.
Published 2014
Jossey-Bass
Table of Contents: ... Jeffries -- Failing To Protect Your Investment / Jim Jeffries -- Beware The "Not Invented Here" Syndrome...

128
Published 2014
ASTD Press
Table of Contents: ...18 The Legal Aspects of Training: Protect What Is Yours and Avoid Taking What Belongs to Someone...

129
by Sarkar, Pushpak
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... Regulations that Impact DaaS 275 -- Checklist to Protect Data Providers from Data Breaches 277 -- Summary 278...

130
by Touhill, Gregory J., Touhill, C. J.
Published 2014
John Wiley & Sons
... to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can...

131
by Bouldin, Barbara M.
Published 1989
Yourdon Press
... as they move from protected markets to open competition, and it explores how these changes can be facilitated...

132
by Kaen, Fred R.
Published 2003
AMACOM
... it comes to protecting shareholder value. In the modern corporation, non-owners commonly manage day-to-day...

133
by Thejendra BS.
Published 2014
IT Governance Pub.
.... In short, poorly managed IT problems could threaten the survival of your business. If you want to protect...

135
by Arway, Arthur G.
Published 2013
CRC Press
... to protect their employees, assets, and clients from incidents of theft and other damaging events. Supply...

136
by Cascarino, Richard
Published 2012
Wiley
... determine whether information systems are adequately protected. Now in a Second Edition, Auditor's Guide...

137
by Bari, Anasse, Chaouchi, Mohamed, Jung, Tommy
Published 2014
John Wiley & Sons
..., but also focuses on practical issues such as protecting project budgets, making good presentations...

138
by Clarke, Justin
Published 2005
Safari Tech Books Online
...If you're an advanced security professional, then you know that the battle to protect online...

139
by Gardner, Bill
Published 2014
Syngress
... Training to warn your organization''s staff of the risk and educate them on how to protect your...