Search alternatives:
"protectionism" » "protection"

1
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

2
by Barringer, Bruce R.
Published 2011
FTPress Delivers

3
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

4
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

5
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

6
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

7
by Brown, Karen A., Hyer, Nancy Lea, Ettenson, Richard
Published 2017
MIT Sloan Management Review

8
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

9
by Duening, Thomas N.
Published 2010
Academic Press

10
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ... disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation...

11
by Myers, Kenneth N.
Published 2006
Wiley
Table of Contents: ...BUSINESS CONTINUITY STRATEGIES: PROTECTING AGAINST UNPLANNED DISASTERS; CONTENTS; PREFACE; Chapter...

12
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... to Protect Against a DDoS Attack; 2.4.3 Intensity of Attack; 2.4.4 Duration of DDoS Attacks; 2.4.5 Repeat...

13
by Wood, Phillip
Published 2012
IT Governance Pub.

14
by Wiedemer, David
Published 2011
John Wiley & Sons
..., the book will: Show readers how to protect assets, businesses, and jobs before and during the coming second...

15
by Watkins, Steve
Published 2007
IT Governance Pub.
Subjects: ...Data protection / Evaluation...

16
by Lakshmi, Vasantha
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... protection -- Data protection...

17
by Sharma, Sanjay
Published 2020
John Wiley & Sons, Inc.
Subjects: ...Data protection / fast...

18
by Taulli, Tom
Published 2022
Apress
Table of Contents: ... Assets -- Part 2: Protecting your wealth -- Chapter 8: Asset Allocation -- Chapter 9: Benefits -- Chapter...

19
by Rinaldo, Carlotta
Published 2020
Routledge
..."Business Negotiations and the Law: The Protection of Weak Professional Parties in Standard Form...

20
by McCarthy, N. K.
Published 2012
McGraw-Hill
...Executable plans for protecting information at risk...