21
by Kunreuther, Howard
Published 2010
Wharton School Pub.
Table of Contents: ... protect against extreme events / Erwann O. Michel-Kerjan -- A financial malignancy / Suzanne Nora Johnson...

22
by Sauter, Mark
Published 2012
McGraw-Hill
Table of Contents: ... Critical Infrastructure Protection and Key Assets: Protecting America's Most Important Targets -- Chapter...

23
by Biringer, Betty E.
Published 2013
Taylor & Francis
... and a designated federal Sector-Specific Agency to lead protection and resilience-building programs...

24
by Skalak, Steven L.
Published 2011
John Wiley & Sons
Table of Contents: ... RELATED TO ANONYMOUS REPORTING AND WHISTLE-BLOWER PROTECTIONS; RECEIPT OF AN ANONYMOUS COMMUNICATION...

25
by Johansen, Gerard
Published 2022
Packt Publishing Ltd.
Table of Contents: ...-volatile evidence -- FTK obtaining protected files -- The CyLR response tool -- Kroll Artifact Parser...

26
by Reiber, Lee
Published 2016
McGraw-Hill Education
Table of Contents: ..., Protecting, and Seizing Digital Device Evidence -- Before Seizure: Understanding Mobile Device Communication...

27
by Henderson, Hazel
Published 1996
Berrett-Koehler Publishers

28
Published 2021
Routledge
Table of Contents: ... governance and data protection in India: a critical legal analysis -- Cybersecurity: a national priority...

29
by Carvey, Harlan A.
Published 2014
Syngress
Table of Contents: ... write ups; Digging deeper; Packed files; Digital signatures; Windows File Protection; Alternate data...

30
by Hatamura, Yōtarō, Abe, Seiji, Fuchigami, Masao, Kasahara, Naoto
Published 2015
Woodhead Publishing is an imprint of Elsevier
Table of Contents: ...); Fire protection; 2.3. The sequence of events from earthquake and tsunami to station blackout (SBO...

31
by Nathans, David
Published 2015
Syngress
...Do you know what weapons are used to protect against cyber warfare and what tools to use...

32
by Pawłowska, Małgorzata
Published 2014
CRC Press
... of bioaerosols and odors. There are many ways of preventing the negative impact of landfills or protecting...

33
by Bullock, Jane, Haddow, George, Haddow, Kim, Coppola, Damon
Published 2017
Auerbach Publications
... to protect lives and businesses, to reduce their...

34
by Allen, Joseph G., Macomber, John D.
Published 2020
Tantor Audio
... how buildings can both expose you to and protect you from disease. With decades of practice...

35
by Doro-on, Anna Maricel
Published 2014
CRC Press, Taylor & Francis Group
... analyzing alternatives for protecting underground rail, oil and gas pipelines, pipeline freight...

36
by Jaffin, Robert
Published 2013
CRC Press
... compliance and personal protective equipment (PPE)-but not the life cycle management of the materials...

37
by McEntire, David A.
Published 2022
Wiley
... to protect life and property. Disaster recovery is the process, policies and procedures that are related...

38
by Middleton, Bruce
Published 2022
Auerbach Publishers, Incorporated
... to protect our data communications systems, but security threats dictate that they must be all the more...

39
by Bingley, Richard
Published 2024
IT Governance Publishing
... of risk management tactics and strategies to protect yourself against such nefarious threat actors...

40
by Hull, Matthew
Published 2010
W. Andrew
... of nanomaterials), and the implications of occupational hygiene precautions and consumer protections. Real-world...