181
by Collins, Judith M.
Published 2005
John Wiley
Table of Contents: ... -- Securing the people front: the security job analysis -- The people front: recruitment for security...

182
Published 2005
Physica
Table of Contents: ...Old and New Security Risks and Instability in the Balkans -- Theoretic Preconditions of Fighting...

183
by Ricardo, David
Published 1846
J. Murray
Table of Contents: ... on the influence of a low price of corn on the profits of stock -- Proposals for an economical and secure currency...

184
by Clayton, Russell, Artis, Andrew, Kong, Dejun Tony
Published 2023
MIT Sloan Management Review
... to help employees secure professional development funding...

185
by Carroll, William K.
Published 2021
Athabasca University Press
...Contributors demonstrate how corporations secure popular consent, and coopt, disorganize...

186
Published 2023
ROUTLEDGE
... national borders, organisations secure the most competent talent available world-wide. Employing the best...

187
Published 2004
Springer Netherlands
Table of Contents: ...Foreword -- Section I Environment Security -- Environmental Security and Human Security -- Section...

188
by Burgess, Christopher
Published 2008
Syngress
Table of Contents: ... Study--The Mysterious Social Engineering Attacks on Entity X; Personnel Security; Physical Security...

189
by De Witte, Kristof
Published 2018
Waxmann Verlag
...Schools should offer a safe and secure environment for all young people to develop, to learn...

190
by Honkatukia, Päivi
Published 2023
Taylor & Francis
... and as vitally important to secure the sustainable future of humankind and the whole eco-social system...

191
by Elliot, Patricia
Published 2016
Routledge
... to foster and secure the lives of transsexuals and transgendered persons will be promoted or undermined - a...

192
by Thejendra BS.
Published 2014
IT Governance Pub.
Table of Contents: ... -- IT contractor disasters -- IT project failures -- Information security -- Cyber security issues -- Introduction...

193
by Jain, Anu
Published 2019
John Wiley & Sons, Inc.
... are ancillary, but critical, topics such as data security and governance that may not traditionally be a part...

194
by Baker, Phil
Published 2010
FTPress Delivers
... the secure area behind the frosted glass door with "Product Development" stenciled on it. Behind this door...

195
by Giordano, Simona
Published 2020
Manchester University Press
... in diverse ways to secure the widest representation of the many interests engaged. They include some...

196
Published 2013
Springer Fachmedien Wiesbaden
Table of Contents: ...Current and Future Security Challenges -- Transformations of the Military -- Interventionism, Post...

197
by Al Hour, Abdullah
Published 2012
IT Governance Pub.
Table of Contents: ...Chapter 6: Technology Continuity StandardsISO/IEC 27031 information technology -- security...

198
by Cascarino, Richard
Published 2007
John Wiley & Sons
Table of Contents: ... -- Service center management -- Protection of information assets -- Information assets security management...

199
by Begole, James
[FTPress Delivers]
... and digital formats. Advanced secure printing from smartphones: how Xerox is leveraging the cloud to deliver a...

200
by Utley, Craig
Published 2008
McGraw-Hill
Table of Contents: ... in PerformancePoint Server -- pt. III. Additional tools and security -- Ch. 8. PerformancePoint deployment...