141
by Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents: ... -- What Is the True Cost of a Cyber Attack? -- U.S. Cyber Public Policy: Don't Rely on It to Protect...

142
by McGuire, Russell
Published 2007
John Wiley & Sons
Table of Contents: ... steps -- Digitize -- Connect -- Evaluate -- Limit -- Position -- Protect -- Learn from your customers...

143
by Wiles, Jack
Published 2007
Syngress

144
by DiSalvatore, Anthony V.
Published 2016
CRC Press
Table of Contents: ...: Security Management; Chapter 3: Investigations; Chapter 4: Protection of Sensitive Information; Chapter 5...

145
by Monosoff, Tamara
Published 2014
McGraw-Hill Education
Table of Contents: ... -- Protect yourself : all about patents, copyrights, and trademarks -- Getting the goods -- Get funded...

146
by Manning, Anna
Published 2015
Apress
Table of Contents: ... Spreadsheets and Databases -- Chapter 7. Designing Your Small Business Database -- Chapter 8. Data Protection...

147
by Cherry, Denny
Published 2022
Apress L. P.
Table of Contents: .... The People -- 9. Protection Against the Weakest Security Link -- 10. Employee Training...

148
by Sundararajan, Arun
Published 2016
Tantor Audio
Table of Contents: ... capitalism -- The shifting landscape of regulation and consumer protection -- The future of work : challenges...

149
by Ushakov, I. A.
Published 2013
Wiley
Table of Contents: ...: Protection Resources Allocation...

150
by Williams, Kevan
Published 2011
Prentice Hall, Pearson
Table of Contents: ...! -- Funding your business -- The people side of your plan -- Protecting your ideas -- How to reduce your plan...

151
by Lavine, Alan
Published 2007
Que Pub.
Table of Contents: ... -- Weighing the pros and cons of simple investment options -- Creating a plan that works for you -- Protecting...

152
by Charlebois-Laprade, Nikolas
Published 2017
Apress
Table of Contents: ... protection in Office 365 -- Understanding and troubleshooting Office 365 Mail flow -- Final thoughts...

153
by Alford, Catherine
Published 2021
Wiley
Table of Contents: ... Credit Score -- How to Negotiate, Earn Extra Money, and Start Investing -- Protect Your Family...

154
by Chiaravalle, Bill
Published 2007
Wiley
Table of Contents: ...; Part V: Protecting Your Brand; Part VI: The Part of Tens; Index...

155
by Peddicord, Kathleen
Published 2013
Wiley
Table of Contents: ... to diversify your assets, protect your wealth, and avoid taxes while creating cash flow and profits -- Buy...

156
by Delaney, Laurel J.
Published 2014
Apress
Table of Contents: ...Legal Protection in the Online EnvironmentDomain Name Protection: Part of Your IP Protection; Other...

157
by Pynes, Joan
Published 2013
Jossey-Bass
Table of Contents: ... protections -- Managing a diverse workforce -- Job analysis -- Recruitment and selection -- Compensation...

158
by Opp, Susan M.
Published 2013
CRC Press
Table of Contents: ... -- Local Economic Development and Environmental Protection: The Intersection; Chapter 2 -- Sustainability...

159
by Cascarino, Richard
Published 2007
John Wiley & Sons
Table of Contents: ... -- Service center management -- Protection of information assets -- Information assets security management...

160
by Johnson, Steve
Published 2013
Que
Table of Contents: ... on the Web -- Protecting and securing documents -- Reviewing and sharing documents -- Sharing information...