121
by Gorshe, Steve
Published 2014
John Wiley & Sons
Table of Contents: ... Correction; 4.3.7 Protection Switching; 4.3.8 ONU Activation...

122
by Rice, Bob
Published 2013
HarperBusiness
Table of Contents: ... alternative strategies -- Higher, inflation-protected current income (Job 1) -- Broadening the base for risk...

123
by Fisher, Ed, Chamberlain, Nate
Published 2020
Microsoft Press
... implementation and administration, including identity, access, threat and information protection, governance...

124
by Brunskill, Charlotte
Published 2012
Chandos
Table of Contents: ... requirements; Introduction; Public Records Acts 1958 and 1967; Local government legislation; Data Protection...

125
by Ricks, Truett A.
Published 2015
CRC Press
Table of Contents: ...Part 1. Security and safety planning -- part 2. Infrastructure protection...

126
by Persaud, Avinash
Published 2015
Apress
Table of Contents: ...The Historical Evolution of Modern Consumer Protection Regulation Is the Current Approach Working...

127
by Drescher, Daniel
Published 2017
Apress
Table of Contents: ... world -- Identifying and protecting user accounts -- Authorizing transactions -- Storing transaction...

128
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ... and Protecting What's Important -- Practice Makes Perfect: Karate Forms and Organizational Memory -- Punching...

129
by Burgess, Christopher
Published 2008
Syngress
Table of Contents: ...-The "Duh" Factor; Information Security; The Intelligent Approach; Protecting Intellectual Property...

130
by Dresner, Steven
Published 2014
John Wiley & Sons, Inc.
Table of Contents: ...; Budgeting, Projections, and Forecasting; Conclusion; Chapter 6: Protecting Your Intellectual Property...

131
by Key, Stephen
Published 2016
McGraw-Hill
Table of Contents: .... Prove your idea -- Part four. Protect your idea -- Part five. Prepare to pitch your idea...

132
by Jones, Phil M.
Published 2018
Wiley
Table of Contents: ... indecision -- 8. Protecting your investment...

133
by Bott, Frank, Taylor, Neil
Published 2022
BCS, The Chartered Institute for IT
... the GDPR and Data Protection Act, health and safety, and the impact of IT on the environment...

134
by Chiaravalle, Bill, Schenck, Barbara Findlay
Published 2015
John Wiley & Sons
Table of Contents: ... brand fans and followers -- Part 4. Caring for your brand -- Part 5. Protecting your brand -- Part 6...

135
by Haller, Klaus
Published 2022
Apress
Table of Contents: ... Organization -- 6. AI & Data Management Architectures -- 7. Securing & Protecting AI Environments -- 8. Looking...

136
by Lowe, Doug
Published 2013
John Wiley & Sons
Table of Contents: ... with servers -- pt. 4. Cloudy with a chance of gigabytes -- pt. 5. Managing and protecting your network -- pt...

137
by Etheridge, Denise
Published 2007
Wiley Pub.
Table of Contents: .... Protect, save, and print -- 9. Extend Excel -- 10. Customize Excel...

138
by Mitchell, Jonathan M.
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... 107 Better Out than In? 108 Protecting the Crown Jewels 110 Everyone Needs to Win 113 In Summary 5...

139
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect...

140
by McGuire, Russell
Published 2007
John Wiley & Sons
Table of Contents: ... steps -- Digitize -- Connect -- Evaluate -- Limit -- Position -- Protect -- Learn from your customers...