1
by Gordon, Victoria
Published 2013
CRC Press/Taylor & Francis
Table of Contents: ... and symbolism of public policies -- The evolution and devolution of maternity leave as an employee benefit...

2
by Senior, Nassau William
Published 1830
J. Murray
Subjects: ...Great Britain / Economic policy...

3
by Clow, Julie
Published 2012
Wiley
Subjects: ...POLITICAL SCIENCE / Public Policy / Cultural Policy / bisacsh...

4
by Daniel, Ute
Published 1989
Vandenhoeck & Ruprecht
Subjects: ...Germany -- Social policy...

5
by Annis, Barbara
Published 2013
Tantor Audio
Subjects: ...POLITICAL SCIENCE / Public Policy / Cultural Policy / bisacsh...

6
by Kocollari, Ulpiana
Published 2018
Routledge Taylor and Francis Group
Subjects: ...Environmental policy / fast...

7
by Photopoulos, Constantine
Published 2008
Syngress
Table of Contents: ... Security Policy -- Ch. 5. Response Program -- Ch. 6. Detection and Reporting -- Ch. 7. Evaluation...

8
by Al Hour, Abdullah
Published 2012
IT Governance Pub.
Table of Contents: ... life cycle; Features of effective BCM software; Deploying BCM software; Appendix 1: BCM Policy...

9
by Watkins, Steve
Published 2007
IT Governance Pub.
Table of Contents: ...: Answering Auditors' questions; 5: What happens when the Auditor finds something wrong?; 6: Policies; 7...

10
by Cross, Michael
Published 2014
Syngress
Table of Contents: ... -- 7. The dark side -- 8. Risk management -- 9. Policies and privacy -- 10. Security -- 11. Where do we...

11
by Mitchell, Stewart
Published 2009
IT Governance Pub.
Table of Contents: ...Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks...

12
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

13
by Marks, Eric A.
Published 2008
John Wiley & Sons
Table of Contents: ... Process -- Ch. 6. SOA Governance Goals, Principles, and Policies -- Ch. 7. SOA Governance Organizational...

14
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ... -- ch. 16. Crafting a security policy -- ch. 17. Performing security analyses and audits -- ch. 18...

15
by Drewitt, Tony
Published 2012
IT Governance Publishing
Table of Contents: ...APPENDIX 1: ACRONYMSAPPENDIX 2: BUSINESS CONTINUITY POLICY; Policy statement; APPENDIX 3: A SIMPLE...

16
by Simmons, Andrea C.
Published 2012
IT Governance Pub.
Table of Contents: ...How often are systems updated?How many exceptions (deviations) to policy are there?; When were...

17
by Touhill, Gregory J., Touhill, C. J.
Published 2014
John Wiley & Sons
Table of Contents: ... for Excellence; 5.1.2 A Plan of Action; 5.1.3 Doing Things ; 5.2 POLICIES COMPLEMENT PLANS; 5.2.1 Great...

18
by Pynes, Joan
Published 2013
Jossey-Bass
... use of technology in human resources management, and changing approaches to HRM policy and practice...

19
by Robbins, Harvey
Published 2000
Berrett-Koehler Publishers
Table of Contents: ... Policies and Procedures; Chapter 10 The People Problem; Chapter 11 Dealing with Difficult People; Chapter...

20
by Goodman, Paul S.
Published 1986
Jossey-Bass
... committees, staff meetings, advisory groups, and policy committees. In eleven original chapters, reviews...