Search alternatives:
"protectionism" » "protection"

181
by Karp, David A.
Published 2003
O'Reilly
Table of Contents: .... Protect Your Copyright 59. Host Your Own Photos -- 60. Make Clickable Thumbnails -- 61. Construct...

182
by Tippins, Nancy Thomas
Published 2011
Jossey-Bass
Table of Contents: ... Janovics -- Video-based testing at U.S. Customs and Border Protection / Jeffrey M. Cucina, Henry H...

183
by Crawley, Kim
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... -- An Introduction to Common Data Privacy Regulations -- The General Data Protection Regulation -- The California...

184
by Fernando, A. C.
Published 2011
Pearson
Table of Contents: ... -- Technology in Developing Countries -- Technology Acquisition and Protection -- Technology Transfer...

185
by Varma, Sumati
Published 2012
Pearson
Table of Contents: ... or Protectionism? The BRIICS Story -- Summary -- Key Terms -- Discussion Questions -- Mini Projects -- Endnotes...

186
by Haughey, Brian
Published 2011
Wiley
Table of Contents: ... Hedge -- 7.2 A Sample Hedge -- 7.3 Static and Dynamic Hedging -- 7.4 Proxy Hedging -- 7.5 Protection...

187
Published 2018
Routledge
Table of Contents: ... an "always-on" e-business; 19 Using location k-anonymity models for protecting location privacy; Part V Risk...

188
by Yarrow, Kit
Published 2014
Jossey-Bass, A Wiley Brand
Table of Contents: ...Trust and Self-RelianceCommunity Through Commonalities; RUDE!; Self-Protection; Matters of Trust; A...

189
by Duncan, Christopher
Published 2013
Apress
Table of Contents: ...: Taking Care of Business; Protect Your Future; Boring Business Stuff; Your Home Office; Trust No One; Get...

190
by Berkery, Dermot
Published 2023
McGraw-Hill
Table of Contents: ... and Businesses Off Their Ownership Fixation -- TxC Five: Regulation and Government Protection -- CHAPTER 10 Why...

191
by Jain, Vinod Kumar
Published 2023
Productivity Press
Table of Contents: ... -- Localization -- Licensing and Partnering -- IP Protection -- Notes -- 6 Digital Business Models -- Direct...

192
Published 2023
Productivity Press
Table of Contents: ... to Protect the Public-Hierarchy of Medical Misinformation-Hierarchy of Tech Hype Misinformation-When Dogma...

193
by Jankensgård, Håkan, Alviniussen, Alf, Oxelheim, Lars
Published 2020
John Wiley & Sons, Ltd.
Table of Contents: ... for FXRM: Cash Flow Hedging -- The Case for FXRM: Protecting Financial Ratios -- The Case for FXRM...

194
by Underwood, Jim
Published 2013
Wiley
Table of Contents: ... to Legal and Ethical Guidelines; Protecting Sensitive Information; Chapter 2: Getting Started with CI...

195
by Dawson, Steve
Published 2015
Wiley
Table of Contents: ...Element 8. Acting in Good FaithElement 9. Whistle-Blower Protection; Element 10. Suspension...

196
by Jeschke, Egbert
Published 2012
Microsoft Press
Table of Contents: ...; Converting Existing Values; Protecting Formulas; Hiding Formulas; Specifying the Formula Calculation Type...

197
by Neagu, Adrian
Published 2012
Packt Pub.
Table of Contents: ... network security kernel tunables to protect your system; How to do it ... ; How it works...

198
by Miller, Andrew
Published 2014
AMACOM
Table of Contents: ...; The Four Phases of Operational Excellence; Creating Gates: Protecting Your Gains...

199
by Desai, Jatin
Published 2013
John Wiley & Sons, Inc.
Table of Contents: ... Awareness-Educate Everyone; 6. Protect the Momentum; Conclusion; Note; Part III Playing the Game; Chapter 6...

200
by Kovacich, Gerald L.
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ... FRAUD-RELATED LAWS -- RELEVANT CONSUMER PROTECTION LAWS FOR FRAUD IN THE UNITED STATES -- A FEW EXAMPLES...