Search alternatives:
"protectionism" » "protection"

1
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

2
by Grimes, Roger A.
Published 2022
Wiley
... destructive IT threats and learning about concrete steps that can be taken now to protect organizations from...

3
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

4
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

5
by Barringer, Bruce R.
Published 2011
FTPress Delivers

6
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

7
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

8
by Brown, Karen A., Hyer, Nancy Lea, Ettenson, Richard
Published 2017
MIT Sloan Management Review

9
by Weisman, Steve
Published 2010
Pearson Education Pub. as FTPress Delivers
...Thirty-one simple rules for protecting your IRAs and 401(k)s...

10
by Lipman, Frederick D.
Published 2012
Wiley
Table of Contents: ... Tam Cases -- IRS Whistleblowers -- Other Statutory Incentives and Protections for Whistleblowers -- A...

11
by Kaplan, James M., Bailey, Tucker, Rezek, Chris, O'Halloran, Derek
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Prioritize Risks and Target Protections -- Do Business in a Digitally Resilient Way -- Modernize IT to Secure...

12
by Duening, Thomas N.
Published 2010
Academic Press

13
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ... disruptions; Chapter 12: Risk assessment; Part 4: Protection activities; Chapter 13: Implementation...

14
by Wood, Phillip
Published 2012
IT Governance Pub.

15
by Coburn, Andrew
Published 2018
John Wiley & Sons, Incorporated
Table of Contents: ... to Protect Against a DDoS Attack; 2.4.3 Intensity of Attack; 2.4.4 Duration of DDoS Attacks; 2.4.5 Repeat...

16
by Myers, Kenneth N.
Published 2006
Wiley
Table of Contents: ...BUSINESS CONTINUITY STRATEGIES: PROTECTING AGAINST UNPLANNED DISASTERS; CONTENTS; PREFACE; Chapter...

17
Published 2018
O'Reilly Media, Inc.

19
by Wiedemer, David, Wiedemer, Robert A., Spitzer, Cindy S.
Published 2014
John Wiley & Sons
Table of Contents: ...Aftershock: Protect Yourself and Profit in the Next Global Financial Meltdown; Copyright; Contents...

20
by Wiedemer, David
Published 2011
John Wiley & Sons
..., the book will: Show readers how to protect assets, businesses, and jobs before and during the coming second...