Search alternatives:
"protectionism" » "protection"

61
by Swaminathan, Anand, Meffert, Jürgen
Published 2017
Wiley
Table of Contents: ... Data and Analytics to Improve Decision Making -- Protect Critical Infrastructure and Confidential Data...

62 Table of Contents: ... -- Determination of Possible Causes of Major Accidents -- 8.3.1.6 -- Specification of Scenarios and Protection Aims...

63
by Anderson, Gretchen
Published 2019
O'Reilly Media
Table of Contents: ...Try It, You'll Like ItBuilding Trust Through Vulnerability; Leading Teams Toward Trust; Protect...

64
by Blount, Jeb
Published 2015
Wiley
Table of Contents: ...Chapter 8: Time: The Great Equalizer of Sales24; Adopt a CEO Mindset; Protect the Golden Hours...

65
by Da Silva, Maxwell Dayvson, Tavares, Hugo Lopes
Published 2015
Packt Publishing
Table of Contents: ... Your Data); The basic security; Obfuscating critical commands; Networking security; Protecting Redis...

66
by Lopp, Michael
Published 2016
Apress
Table of Contents: ...) Bonus: Can your boss? (+1); Do you have well-defined and protected time to be strategic? (+1); Are you...

67
by Hewlin, Todd, Snyder, Scott A.
Published 2019
John Wiley & Sons, Inc.
Table of Contents: ... Investment Board; Why Big I Initiatives Need Protection; What Decisions Can Your VIB Make?; Who Should Lead...

68
by Gordon, Jon, Kelly, Amy
Published 2018
John Wiley & Sons, Inc.
Table of Contents: ... -- Protection from Energy Vampires -- Energy Vampires: A Word of Caution -- Dealing with Energy Vampires...

69
by Marr, Bernard, Ward, Matt
Published 2019
Wiley
Table of Contents: .... Apple : integrating AI into products and protecting user privacy -- 5. Baidu : machine learning...

70
by Grau, David
Published 2014
John Wiley & Sons Inc.
Table of Contents: ... -- Recruiting Next-Generation Talent to Grow Your Business -- Preserving and Protecting What You've Built...

71
Published 2014
ASTD Press
Table of Contents: ...18 The Legal Aspects of Training: Protect What Is Yours and Avoid Taking What Belongs to Someone...

72
by Sarkar, Pushpak
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... Regulations that Impact DaaS 275 -- Checklist to Protect Data Providers from Data Breaches 277 -- Summary 278...

73
by Touhill, Gregory J., Touhill, C. J.
Published 2014
John Wiley & Sons
... to better protect their business. It emphasizes, in a direct and uncomplicated way, how executives can...

74
by Pawłowska, Małgorzata
Published 2014
CRC Press
... of bioaerosols and odors. There are many ways of preventing the negative impact of landfills or protecting...

75
by Finney, Martha I.
Published 2010
Pearson Education Pub. as FTPress Delivers
...: 9780137021147) by Martha Finney. A step-by-step plan for financial self-protection: make it easier to survive a...

76
by Thejendra BS.
Published 2014
IT Governance Pub.
.... In short, poorly managed IT problems could threaten the survival of your business. If you want to protect...

77
by Gomzin, Slava
Published 2014
Wiley
... security breaches than any other data type. In too many places, sensitive card data is simply not protected...

78
by Litow, Stanley S.
Published 2018
John Wiley & Sons, Inc.
... long-term bottom line benefit - Protect and enrich brand value- Recruit and retain top talent Perfect...

79
by Doro-on, Anna Maricel
Published 2014
CRC Press, Taylor & Francis Group
... analyzing alternatives for protecting underground rail, oil and gas pipelines, pipeline freight...

80
by Arway, Arthur G.
Published 2013
CRC Press
... to protect their employees, assets, and clients from incidents of theft and other damaging events. Supply...