1
by Mitchell, Stewart
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

2
by Dahj, Jean Nestor M.
Published 2022
Packt Publishing, Limited
Subjects: ...Data protection / fast...

3
by Moore, Richard O.
Published 2021
John Wiley & Sons
Subjects: ...Data protection / fast...

4
by Carey, Marcus J., Jin, Jennifer
Published 2019
Wiley
Subjects: ...Data protection / fast...

5
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Subjects: ...Data protection / fast...

6
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ... and Protecting What's Important -- Practice Makes Perfect: Karate Forms and Organizational Memory -- Punching...

7
by Thekdi, Shital, Aven, Terje
Published 2023
Routledge
..., organization, and society. People often seek protection from negative risk events, but also seek to take...

8
Published 2018
Routledge
Table of Contents: ... an "always-on" e-business; 19 Using location k-anonymity models for protecting location privacy; Part V Risk...

9
by Jankensgård, Håkan, Alviniussen, Alf, Oxelheim, Lars
Published 2020
John Wiley & Sons, Ltd.
Table of Contents: ... for FXRM: Cash Flow Hedging -- The Case for FXRM: Protecting Financial Ratios -- The Case for FXRM...

10
by Wolfe, Jennifer C.
Published 2020
Apress
... protecting not just shareholders, but all stakeholders. Disruption in the Boardroom delves into the details...