Search alternatives:
local management » fiscal management, clinical management, location management

1
by Kennedy, Leslie W., Irvin-Erickson, Yasemin, Kennedy, Alexis R.
Published 2014
Springer New York
... (such as, terrorism and cybercrime) are managed through local response. It covers emerging strategies in data...

2
Published 2023
Edward Elgar Publishing
Table of Contents: ...Last Mile Delivery Services / Emel Aktas -- Local Intensive Business Services (LIBS) / Magali...

3
by Kelly, Robert J.
Published 1999
Springer US
Table of Contents: ... and Trusteeships: Law Enforcement Responses -- The Teamsters -- Philadelphia Roofers Union, Local 30/30B...

4
by Datt, Samir
Published 2016
Packt Publishing
Subjects: ...Local area networks (Computer networks) / Security measures / http://id.loc.gov/authorities...

5
by Tella, José
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...conservation management...

6
by Wright, Mark
Published 2022
Palgrave Macmillan
Table of Contents: ...1. Introduction: Are the Offences in the Resource Management Act 1991 (RMA)Working? -- 2...

7
by Donoghue, Jane
Published 2010
Palgrave Macmillan UK
... control, and offers an alternative perspective on anti-social behaviour management which argues that ASBOs...

8
by Rogers, Anne, Pilgrim, David
Published 1996
Macmillan Education UK
... about the management of madness and the reduction of mental distress in society. Mental Health Policy...

9
by Doran, Bruce J., Burgess, Melissa B.
Published 2012
Springer New York
Table of Contents: ...: What causes fear of crime?.-Chapter 4: Managing fear of crime -- Chapter 5: Investigating the fear...

10
by Wells, Joseph T.
Published 2018
John Wiley & Sons, Inc.
... for more than 35 countries around the globe. These country-focused discussions contributed by local anti...

11
Published 2023
Palgrave Macmillan
... detective with 13+ years of law enforcement experience with local and federal police agencies. Her previous...

12
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... -- Tactical level -- IT leadership -- Tactical level -- cyber intelligence program manager -- Operational...

13
by Cox, Dennis W.
Published 2014
Wiley
Table of Contents: ... Cards; 7.3.2 Electronic Money; 7.3.3 Wealth Management; 7.3.4 General Insurers; 7.3.5 Execution-only...

14
by Quayson, Ato
Published 2012
Routledge
Table of Contents: ... trafficking : suggestions from experiences of local service providers / Amy Stephens, Romesh Hettiarachchi...

15
Published 2021
CRC Press
Table of Contents: ... engineering attacks -- Waste management social engineering attacks -- Mobile device social engineering attacks...

16
by Sood, Aditya K.
Published 2014
Syngress
Table of Contents: ... Maintaining Control; 6.1.1 Deploying BackConnect Servers; 6.1.2 Local Privilege Escalation...

17
by Liska, Allan, Gallo, Timothy
Published 2016
O'Reilly Media
Table of Contents: ...Don't Allow JavaScript Files to Execute LocallyStop the Initial Callout; Reverse-Engineering...

18
by Shaaban, Ayman, Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents: ... management -- Technical skills -- Security fundamentals -- Security principles -- Security vulnerabilities...