201
by Biafore, Bonnie
Published 2008
O'Reilly Media
Table of Contents: .... Creating Reports and Graphs -- Ch. 15. Backing Up and Protecting Your Quicken Data -- Ch. 16. Customizing...

202
by Rich, Jason
Published 2013
Que
Table of Contents: ... informed using iBooks, newsstand, and web content -- Protecting your iPad and its data -- Creating...

203
by Richards, Jay W.
Published 2013
McGraw-Hill Education
... infiltrated not only the Consumer Financial Protection Bureau, but the FDIC, the Treasury, and other...

204
by Bott, Frank
Published 2005
British Computer Society
Table of Contents: ... Rights; 14 Data Protection, Privacy and Freedom of Information; 15 Internet Issues...

205
by Ferris, Randall W., Murphy, Daniel
Published 2016
Butterworth-Heinemann, an imprint of Elsevier
... workplace violence protection program. The book offers real-life cases studies on how violence...

206
by Kovacich, Gerald L.
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ... FRAUD-RELATED LAWS -- RELEVANT CONSUMER PROTECTION LAWS FOR FRAUD IN THE UNITED STATES -- A FEW EXAMPLES...

207
by Ohlhorst, Frank
Published 2013
John Wiley & Sons
Table of Contents: ..., Compliance, Auditing, and Protection; Pragmatic Steps to Securing Big Data; Classifying Data; Protecting Big...

208
by Kendrick, Rupert
Published 2010
IT Governance Pub.
... security and data protection, the author combines his legal expertise with a solid, practical grasp...

209
by Barbaroux, Pierre, Attour, Amel, Schenk, Eric
Published 2016
ISTE
Table of Contents: ...; 2.3.1. Patents: protection and knowledge management instruments; 2.3.2. Cooperation agreements...

210
by Roper, Carl
Published 2014
CRC Press
Table of Contents: .... Protecting your data -- chapter 17. Source documents and other resources...

211
by Raghavan, Ram
Published 2011
Chandos Pub.
Table of Contents: ... to practical HR; Practical HR; Value addition and value protection...

212
by Moschovitis, Christos J. P.
Published 2018
Wiley
Table of Contents: ...; Cybersecurity-Awareness Training; CHAPTER 13: Living Cybersecure!; General Data Protection Regulation (GDPR...

213
by Rowe, Sandra F.
Published 2015
Management Concepts Press
Table of Contents: ... Project Communications; PLANNING PROCESS GUIDE FOR SIMPLE PROTECTS; Chapter 9 Controlling; Controlling...

214
by Gilge, Megan
Published 2015
IBM Corporation, International Technical Support Organization
...-in RAID technologies, all data is well-protected with options to add more protection through mirroring...

215
Published 2023
Assemble You
... is sustainability? According to the United States Environmental Protection Agency, "Sustainability is based on a...

216
by Dolan, Gabrielle
Published 2019
Recorded Books, Inc.
... how decades of systematic deceit, jargon, alternative facts and a top-down culture of self-protection...

217
by Collier, Marsha
Published 2013
John Wiley & Sons
Table of Contents: ... Before Buying; Getting Protection on eBay; Chapter 6: Bidding to Win; Understanding the Bidding Action...

218
by Wiedemer, David
Published 2012
John Wiley & Sons
Table of Contents: ... or Deflation, It's About Protecting the Status Quo with Denial; Why Don't More People See This?; Don't Expect...

219
by Cook, Thomas A., Raia, Kelly
Published 2017
AMACOM
Table of Contents: ... and Secure" Inbound Supply Chain; 12 Bureau of Customs and Border Protection: Compliance and Security...

220
by Nolan-Brown, Patricia
Published 2014
AMACOM
Table of Contents: ... -- Protect it (step three): keep thieves away -- Pitch it (step four): make 'em want it bad -- Make it (step...