1
by Wood, Phillip
Published 2012
IT Governance Pub.

2
by Calder, Alan
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

4
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Subjects: ...Data protection / fast...

5
by Mitchell, Stewart
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

6
by Dahj, Jean Nestor M.
Published 2022
Packt Publishing, Limited
Subjects: ...Data protection / fast...

7
by Moore, Richard O.
Published 2021
John Wiley & Sons
Subjects: ...Data protection / fast...

8
by Sutton, David
Published 2021
BCS, The Chartered Institute for IT
Subjects: ...Privacy & data protection / bicssc...

9
by Carey, Marcus J., Jin, Jennifer
Published 2019
Wiley
Subjects: ...Data protection / fast...

10
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Subjects: ...Data protection / fast...

11
by Persaud, Avinash
Published 2015
Apress
Table of Contents: ...The Historical Evolution of Modern Consumer Protection Regulation Is the Current Approach Working...

12
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ... and Protecting What's Important -- Practice Makes Perfect: Karate Forms and Organizational Memory -- Punching...

13
by Swope, Rick
Published 2012
Wiley
Table of Contents: ...; CHAPTER 4 Protecting Your Position; Seven Keys to Risk Management Success; Three Legs of Managing Risk...

14
by Hubbard, Douglas W., Seiersen, Richard
Published 2016
John Wiley & Sons

15
by Kendrick, Rupert
Published 2010
IT Governance Pub.
... security and data protection, the author combines his legal expertise with a solid, practical grasp...

16
by Young, Carl S.
Published 2010
Syngress/Elsevier
... to information protection, electromagnetic pulse, biological, chemical and radiological weapons, theft...

17
by Haughey, Brian
Published 2011
Wiley
Table of Contents: ... Hedge -- 7.2 A Sample Hedge -- 7.3 Static and Dynamic Hedging -- 7.4 Proxy Hedging -- 7.5 Protection...

18
Published 2018
Routledge
Table of Contents: ... an "always-on" e-business; 19 Using location k-anonymity models for protecting location privacy; Part V Risk...

19
by Dietrich, Mark O.
Published 2012
John Wiley & Sons
Table of Contents: ... Improvement and Protection Act; Failure of Managed Care...

20
by Jankensgård, Håkan, Alviniussen, Alf, Oxelheim, Lars
Published 2020
John Wiley & Sons, Ltd.
Table of Contents: ... for FXRM: Cash Flow Hedging -- The Case for FXRM: Protecting Financial Ratios -- The Case for FXRM...