1
by Wood, Phillip
Published 2012
IT Governance Pub.

2
by Calder, Alan
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

4
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Subjects: ...Data protection / fast...

5
by Mitchell, Stewart
Published 2009
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

6
by Moore, Richard O.
Published 2021
John Wiley & Sons
Subjects: ...Data protection / fast...

7
by Dahj, Jean Nestor M.
Published 2022
Packt Publishing, Limited
Subjects: ...Data protection / fast...

8
by Sutton, David
Published 2021
BCS, The Chartered Institute for IT
Subjects: ...Privacy & data protection / bicssc...

9
by Carey, Marcus J., Jin, Jennifer
Published 2019
Wiley
Subjects: ...Data protection / fast...

10
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
Subjects: ...Data protection / fast...

11
by Persaud, Avinash
Published 2015
Apress
Table of Contents: ...The Historical Evolution of Modern Consumer Protection Regulation Is the Current Approach Working...

12
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ... and Protecting What's Important -- Practice Makes Perfect: Karate Forms and Organizational Memory -- Punching...

13
by Swope, Rick
Published 2012
Wiley
Table of Contents: ...; CHAPTER 4 Protecting Your Position; Seven Keys to Risk Management Success; Three Legs of Managing Risk...

14
by Hubbard, Douglas W., Seiersen, Richard
Published 2016
John Wiley & Sons

15
by Kendrick, Rupert
Published 2010
IT Governance Pub.
... security and data protection, the author combines his legal expertise with a solid, practical grasp...

16
by Young, Carl S.
Published 2010
Syngress/Elsevier
... to information protection, electromagnetic pulse, biological, chemical and radiological weapons, theft...

17
by Thekdi, Shital, Aven, Terje
Published 2023
Routledge
..., organization, and society. People often seek protection from negative risk events, but also seek to take...

18
by Haughey, Brian
Published 2011
Wiley
Table of Contents: ... Hedge -- 7.2 A Sample Hedge -- 7.3 Static and Dynamic Hedging -- 7.4 Proxy Hedging -- 7.5 Protection...

19
Published 2018
Routledge
Table of Contents: ... an "always-on" e-business; 19 Using location k-anonymity models for protecting location privacy; Part V Risk...

20
by Dietrich, Mark O.
Published 2012
John Wiley & Sons
Table of Contents: ... Improvement and Protection Act; Failure of Managed Care...