Search alternatives:
table 1a » table 11a, tables 1a, table 1
table 2a » table 27, table 2.1, table 2.2
table 21 » table 2.1, table 1, table 11
table b » table 1, table 3, table 4
table 2 » table 1

1
by Chaput, Bob
Published 2023
Apress
Table of Contents: ...Part I: A Case for Action -- Chapter 1: Enterprise Cyber Risk Management as a Value Creator...

2 Table of Contents: ....7 -- The significance of study; 1.8 -- Organization of report; Chapter 2 -- Literature Review; 2.1 -- Introduction; 2.2...

3
by Sheehy, Elizabeth A.
Published 2012
University of Ottawa Press
Table of Contents: .... Sheehy -- part 1. The victories of Jane Doe / Elizabeth A. Sheehy Appendix A. Amended statement of claim...

4
by Gillham, James R.
Published 1992
Springer New York
Table of Contents: ... -- Appendix A: Tables -- Appendix B: Research Methodology -- Appendix C: Layperson’s Simplified Glossary...

5
by Stanley, Karlyn D., Loredo, Elvira N., Burger, Nicholas, Miles, Jeremy
Published 2014
Rand Corporation
Table of Contents: ...Preface -- Figure and Tables -- Summary -- Acknowledgments -- Abbreviations -- 1. Introduction: A...

6
by Levy, Steven
Published 2010
O'Reilly Media
Table of Contents: ...: Cambridge: The Fifties and Sixties; Chapter 1. The Tech Model Railroad Club; Chapter 2. The Hacker Ethic...

7
by Shaaban, Ayman, Sapronov, Konstantin
Published 2016
Packt Publishing
Table of Contents: ... with the newly-connected client -- Start a new flow -- Appendix B: Case Study -- Introduction -- Scenario...

8
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... -- Part 2 -- Part 3 -- Capability Maturity Model -- continuous monitoring overview -- Level 1 -- phase A...

9
by Morewitz, Stephen J.
Published 2004
Springer US
Table of Contents: ...1. Partner Violence: Causes and Risk Factors -- 2. Prevalence of Abuse -- 3. Partner and Child...