201
by Cummings, Chip
Published 2013
John Wiley
Table of Contents: ... Bargains; Paying for Your Winning Bid; Chapter 4: Protecting Your Investment; What To Do First; Record...

202
by King, Henry, Afshar, Vala
Published 2024
Wiley
... world, one that optimizes not for the accumulation and protection of resources within controlled...

203
by Biafore, Bonnie
Published 2008
O'Reilly Media
Table of Contents: .... Creating Reports and Graphs -- Ch. 15. Backing Up and Protecting Your Quicken Data -- Ch. 16. Customizing...

204
by Rich, Jason
Published 2013
Que
Table of Contents: ... informed using iBooks, newsstand, and web content -- Protecting your iPad and its data -- Creating...

205
by Richards, Jay W.
Published 2013
McGraw-Hill Education
... infiltrated not only the Consumer Financial Protection Bureau, but the FDIC, the Treasury, and other...

206
by Bott, Frank
Published 2005
British Computer Society
Table of Contents: ... Rights; 14 Data Protection, Privacy and Freedom of Information; 15 Internet Issues...

207
by Ferris, Randall W., Murphy, Daniel
Published 2016
Butterworth-Heinemann, an imprint of Elsevier
... workplace violence protection program. The book offers real-life cases studies on how violence...

208
by Kovacich, Gerald L.
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ... FRAUD-RELATED LAWS -- RELEVANT CONSUMER PROTECTION LAWS FOR FRAUD IN THE UNITED STATES -- A FEW EXAMPLES...

209
by Ohlhorst, Frank
Published 2013
John Wiley & Sons
Table of Contents: ..., Compliance, Auditing, and Protection; Pragmatic Steps to Securing Big Data; Classifying Data; Protecting Big...

210
by Kendrick, Rupert
Published 2010
IT Governance Pub.
... security and data protection, the author combines his legal expertise with a solid, practical grasp...

211
by Barbaroux, Pierre, Attour, Amel, Schenk, Eric
Published 2016
ISTE
Table of Contents: ...; 2.3.1. Patents: protection and knowledge management instruments; 2.3.2. Cooperation agreements...

212
by Roper, Carl
Published 2014
CRC Press
Table of Contents: .... Protecting your data -- chapter 17. Source documents and other resources...

213
by Raghavan, Ram
Published 2011
Chandos Pub.
Table of Contents: ... to practical HR; Practical HR; Value addition and value protection...

214
by Rowe, Sandra F.
Published 2015
Management Concepts Press
Table of Contents: ... Project Communications; PLANNING PROCESS GUIDE FOR SIMPLE PROTECTS; Chapter 9 Controlling; Controlling...

215
by Moschovitis, Christos J. P.
Published 2018
Wiley
Table of Contents: ...; Cybersecurity-Awareness Training; CHAPTER 13: Living Cybersecure!; General Data Protection Regulation (GDPR...

216
by Dolan, Gabrielle
Published 2019
Recorded Books, Inc.
... how decades of systematic deceit, jargon, alternative facts and a top-down culture of self-protection...

217
Published 2023
Assemble You
... is sustainability? According to the United States Environmental Protection Agency, "Sustainability is based on a...

218
by Gilge, Megan
Published 2015
IBM Corporation, International Technical Support Organization
...-in RAID technologies, all data is well-protected with options to add more protection through mirroring...

219
by Wiedemer, David
Published 2012
John Wiley & Sons
Table of Contents: ... or Deflation, It's About Protecting the Status Quo with Denial; Why Don't More People See This?; Don't Expect...

220
by Cook, Thomas A., Raia, Kelly
Published 2017
AMACOM
Table of Contents: ... and Secure" Inbound Supply Chain; 12 Bureau of Customs and Border Protection: Compliance and Security...