Search alternatives:
"protectionism" » "protection"

41
by Brosseau, Denise
Published 2013
Jossey-Bass
Table of Contents: ... Name; Show Proof That It Works; Protect and Control Your IP; Codify Your Lessons Learned: A Quick...

42
by Gordon, Jon, Kelly, Amy
Published 2018
John Wiley & Sons, Inc.
Table of Contents: ... -- Protection from Energy Vampires -- Energy Vampires: A Word of Caution -- Dealing with Energy Vampires...

43
by Ulin, Jeff
Published 2013
Focal Press
Table of Contents: ..., Marketing, and Protecting an Idea -- The Development Process -- Development in Stages -- Development...

44
by Marr, Bernard, Ward, Matt
Published 2019
Wiley
Table of Contents: .... Apple : integrating AI into products and protecting user privacy -- 5. Baidu : machine learning...

45
by Grau, David
Published 2014
John Wiley & Sons Inc.
Table of Contents: ... -- Recruiting Next-Generation Talent to Grow Your Business -- Preserving and Protecting What You've Built...

46
by Galpin, Timothy J.
Published 2014
Jossey-Bass
Table of Contents: ... Jeffries -- Failing To Protect Your Investment / Jim Jeffries -- Beware The "Not Invented Here" Syndrome...

47
Published 2014
ASTD Press
Table of Contents: ...18 The Legal Aspects of Training: Protect What Is Yours and Avoid Taking What Belongs to Someone...

48
by Sarkar, Pushpak
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... Regulations that Impact DaaS 275 -- Checklist to Protect Data Providers from Data Breaches 277 -- Summary 278...

49
by Webb, Nicholas J.
Published 2011
Wiley
Table of Contents: ... -- The Components of Digital Innovation -- Chapter 12 Rules of Engagement: Protecting the Value of Your Intellectual...

50
by Touhill, Gregory J., Touhill, C. J.
Published 2014
John Wiley & Sons
... to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can...

51
by Bouldin, Barbara M.
Published 1989
Yourdon Press
... as they move from protected markets to open competition, and it explores how these changes can be facilitated...

52
Published 2018
MIT Sloan Management Review
... partners and valuing the deal to providing protection from lies during the bargaining process and managing...

53
by Bott, Frank, Taylor, Neil
Published 2022
BCS, The Chartered Institute for IT
... the GDPR and Data Protection Act, health and safety, and the impact of IT on the environment...

54
by Thejendra BS.
Published 2014
IT Governance Pub.
.... In short, poorly managed IT problems could threaten the survival of your business. If you want to protect...

55
by Litow, Stanley S.
Published 2018
John Wiley & Sons, Inc.
... long-term bottom line benefit - Protect and enrich brand value- Recruit and retain top talent Perfect...

56
by Arway, Arthur G.
Published 2013
CRC Press
... to protect their employees, assets, and clients from incidents of theft and other damaging events. Supply...

57
by Ferris, Randall W., Murphy, Daniel
Published 2016
Butterworth-Heinemann, an imprint of Elsevier
... workplace violence protection program. The book offers real-life cases studies on how violence...

58
by Cascarino, Richard
Published 2012
Wiley
... determine whether information systems are adequately protected. Now in a Second Edition, Auditor's Guide...

59
by Ward, Damian
Published 2007
Wrightbooks
... to expand and grow your business, but also to protect it if things go wrong. In a tough commercial world...

60
by Bari, Anasse, Chaouchi, Mohamed, Jung, Tommy
Published 2014
John Wiley & Sons
..., but also focuses on practical issues such as protecting project budgets, making good presentations...