Search alternatives:
table bay » table back, table 1a, table bgp
table 2a » table 2, table 21, table 27
table b » table 1, table 2, table 3
table bay » table back, table 1a, table bgp
table 2a » table 2, table 21, table 27
table b » table 1, table 2, table 3
|
by Welfens, Paul J.J., Audretsch, David B., Addison, John T., Grupp, Hariolf
Published 1998
Table of Contents:
“... Competition -- 2. R&D Policy and Employment from a Theoretical Perspective -- 3. R&D Policy and Employment...”Published 1998
Springer Berlin Heidelberg
|
CISO GUIDE TO CYBER RESILIENCE : a how-to guide for every CISO to build a resilient security program
Table of Contents:
“...Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents...”