1
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

2
by Peltier, Thomas R.
Published 2014
CRC Press, Taylor & Francis Group
Subjects: ...Data protection / fast...

3
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...

4
by Williams, Branden R.
Published 2016
Syngress, an imprint of Elsevier
Subjects: ...Data protection / fast...

5
by Wright, Shauna
Published 2006
O'Reilly
Subjects: ...Consumer protection / fast...

6
by Landoll, Douglas J.
Published 2011
CRC Press
Subjects: ...Data protection / fast...

7
by Gadepalli, Venkata, Gandhi, Rajeev, Goering, Addison, Portier, Bertrand
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Data protection / fast...

8
by Iannuzzi, Al
Published 2018
CRC Press
Subjects: ...NATURE / Environmental Conservation & Protection / bisacsh...

9
by Johnson, Harry G.
Published 2013
Routledge
Table of Contents: ...I. The positive theory of tariffs -- II. Tariffs and distortions -- III. The cost of protection...

10
by Drescher, Daniel
Published 2017
Apress
Table of Contents: ... world -- Identifying and protecting user accounts -- Authorizing transactions -- Storing transaction...

11
by Key, Stephen
Published 2016
McGraw-Hill
Table of Contents: .... Prove your idea -- Part four. Protect your idea -- Part five. Prepare to pitch your idea...

12
by Jones, Phil M.
Published 2018
Wiley
Table of Contents: ... indecision -- 8. Protecting your investment...

13
by McGuire, Russell
Published 2007
John Wiley & Sons
Table of Contents: ... steps -- Digitize -- Connect -- Evaluate -- Limit -- Position -- Protect -- Learn from your customers...

14
by Delaney, Laurel J.
Published 2014
Apress
Table of Contents: ...Legal Protection in the Online EnvironmentDomain Name Protection: Part of Your IP Protection; Other...

15
by Swope, Rick
Published 2012
Wiley
Table of Contents: ...; CHAPTER 4 Protecting Your Position; Seven Keys to Risk Management Success; Three Legs of Managing Risk...

16
by Ulin, Jeff
Published 2010
Focal Press
Table of Contents: ... property assets enabling distribution : the business of creating, marketing, and protecting an idea...

17
by Purkiss, John
Published 2012
Pearson
Table of Contents: ... social media to build your brand -- Getting started with social media -- Becoming famous -- Protecting...

18
by Kendrick, Rupert
Published 2010
IT Governance Pub.
... security and data protection, the author combines his legal expertise with a solid, practical grasp...

19
by Cook, Thomas A., Raia, Kelly
Published 2017
AMACOM
Table of Contents: ... and Secure" Inbound Supply Chain; 12 Bureau of Customs and Border Protection: Compliance and Security...

20
by Collier, Marsha
Published 2013
John Wiley & Sons
Table of Contents: ... Before Buying; Getting Protection on eBay; Chapter 6: Bidding to Win; Understanding the Bidding Action...