Search alternatives:
"protectionism" » "protections"

1
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

2
by Maravelas, Anna
Published 2005
Career Press
...How leaders and their employees can protect their sanity and productivity from tension and turf...

3 Subjects: ...Data protection / fast / (OCoLC)fst00887958...

4
by Calder, Alan, Williams, Geraint
Published 2019
IT Governance Publishing
Subjects: ...Data protection / Standards...

5
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Subjects: ...Data protection / fast...

6
by Fuchs, Christian
Published 2012
Routledge
Subjects: ...Data protection / fast...

7
by Unhelkar, Bhuvan
Published 2011
CRC Press
Subjects: ...Technologie de protection de l'environnement...

8
by Butler, Joy R.
Published 2010
Sashay Communications
Table of Contents: ... for the cyber citizen -- Part two, knowing your online rights and responsibilities -- Protecting your online...

9
Published 2009
IT Governance Pub.
Table of Contents: ...; Reputational risk; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness...

10
by Bott, Frank, Taylor, Neil
Published 2022
BCS, The Chartered Institute for IT
... the GDPR and Data Protection Act, health and safety, and the impact of IT on the environment...

11
by Tunley, Martin
Published 2015
John Wiley & Sons
Table of Contents: ...; Sensitive Material; DATA PROTECTION ACT 1998; DPA Terminology; Data Protection Principles; Criminal Offences...

12
by Chou, Philip A.
Published 2007
Elsevier/Academic Press
Table of Contents: ... APPLICATIONS / CH6: SCALABLE AUDIO CODING / CH7: CHANNEL PROTECTION FUNDAMENTALS / CH8: CHANNEL MODELING...

13
by Ferris, Randall W., Murphy, Daniel
Published 2016
Butterworth-Heinemann, an imprint of Elsevier
... workplace violence protection program. The book offers real-life cases studies on how violence...

14
by Dolan, Gabrielle
Published 2019
Recorded Books, Inc.
... how decades of systematic deceit, jargon, alternative facts and a top-down culture of self-protection...

15
by Curry, Ben
Published 2008
Microsoft Press
Table of Contents: ..., Extranet, and Internet Scenarios -- pt. IV. Operating -- 21. Data Protection, Recovery, and Availability...

16
by Mallick, Mita
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... talent. As long as they are good -- We protect the a-holes because our businesses wouldn't run without...

17
by Ilag, Balu N.
Published 2018
Apress
Table of Contents: ...; Security and Compliance; Enabling Information Protection; Using Information Protection Flow; Auditing...

18
by Litow, Stanley S.
Published 2018
John Wiley & Sons, Inc.
... long-term bottom line benefit - Protect and enrich brand value- Recruit and retain top talent Perfect...

19
by Anderson, Gretchen
Published 2019
O'Reilly Media
Table of Contents: ...Try It, You'll Like ItBuilding Trust Through Vulnerability; Leading Teams Toward Trust; Protect...

20
by Gordon, Jon, Kelly, Amy
Published 2018
John Wiley & Sons, Inc.
Table of Contents: ... -- Protection from Energy Vampires -- Energy Vampires: A Word of Caution -- Dealing with Energy Vampires...