201
by Begole, James
[FTPress Delivers]
... and digital formats. Advanced secure printing from smartphones: how Xerox is leveraging the cloud to deliver a...

202
by Maydwell, Isaac
Published 1845
I. Maydwell
Table of Contents: ... & the people versus Peel and the Corn Law League -- The labourer's mine and the lord's security -- Letter...

203
by Antonopoulos, Andreas M.
Published 2017
O'Reilly
Table of Contents: ... -- Mining and consensus -- Bitcoin security -- Blockchain applications...

204
by Halvorsen, Tor
Published 2016
African Minds
...Since the 1990s, internationalisation has become key for institutions wishing to secure funding...

205
by Radivojević, Miljana
Published 2021
Archaeopress Publishing
... and contextually secure evidence for copper smelting in the 49th century BC. This confirms the earlier...

206
by Thornton, Edward
Published 1835
Parbury, Allen
Table of Contents: ... -- Religion and morals -- The judicial system -- Revenue -- Means of securing British interests and authority...

207
by Roper, Kathy O., Payant, Richard P.
Published 2014
AMACOM
Table of Contents: ... -- The Design-Build Cycle -- Facility Emergency Preparedness and Business Continuity -- Facility Security...

208
by Ruppert, David
Published 2004
Springer New York
Table of Contents: ... Theory -- Regression -- The Capital Asset Pricing Model -- Options Pricing -- Fixed Income Securities...

209
by Pan, Jiahua
Published 2016
Springer Berlin Heidelberg
Table of Contents: ... Factory -- Security Association of Natural Resources -- Practice of Ecological Civilization -- Performance...

210
by Templ, Matthias
Published 2017
Springer International Publishing
... restrictions on the access and use of individual data. Proper and secure microdata dissemination calls...

211
by Champlain, Jack J.
Published 2003
John Wiley
Table of Contents: ... Security Policies, Standards, and/or Guidelines; Chapter 5 Auditing Service Organization Applications...

212
by McFarlan, F. Warren
Published 2021
John Wiley & Sons, Inc.
... and the strategy to achieve it. 2. The selection, coaching and evaluation of the CEO. 3. The securing...

213
by Halvorsen, Tor
Published 2016
African Minds
...Since the 1990s, internationalisation has become key for institutions wishing to secure funding...

214
by Radivojević, Miljana
Published 2021
Archaeopress Publishing
... and contextually secure evidence for copper smelting in the 49th century BC. This confirms the earlier...

215
by Volpe, Fabrizio
Published 2015
Packt Publishing
Table of Contents: ... of Contents; Preface; Chapter 1: Lync 2013 Security; Introduction; Controlling administrative rights with RBAC...

216
by Prowse, David L.
Published 2011
Pearson Education
Table of Contents: .... Computer operation -- 8. Operating systems -- 9. Basic security -- 10. Troubleshooting -- 11. Networks...

217
by Capo, Francesca, Di Pietro, Francesca
Published 2024
Routledge
... companies' ability to secure social and financial support, and therefore sustain the development...

218
by Duarte, Felicia, Hoffman, Rachelle
Published 2018
Apress
Table of Contents: ... -- Chapter 9: Security Overview...

219
by Kizza, Joseph Migga
Published 2010
Springer London
Table of Contents: ... and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer...

220
by Guins, George C.
Published 1956
Springer Netherlands
... then coercion proves to be more and more inefficient, and it becomes more and more difficult to secure...