Search alternatives:
"protectionism" » "protections"

21
Published 2021
Springer International Publishing
Subjects: ...Data protection...

23
Published 2019
Springer International Publishing
Subjects: ...Data protection / Law and legislation...

24
by Gadepalli, Venkata, Gandhi, Rajeev, Goering, Addison, Portier, Bertrand
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Data protection / fast...

26
by Landy, Gene K.
Published 2008
Syngress/Elsevier
Table of Contents: ... -- Chapter 2 Digital Copyright Basics -- Chapter 3 Copyrights on the Internet, for Software Protection...

28
Published 2008
Springer Berlin Heidelberg
Subjects: ...Data protection...

30
by Iannuzzi, Al
Published 2018
CRC Press
Subjects: ...NATURE / Environmental Conservation & Protection / bisacsh...

31
by Rivoli, Pietra
Published 2015
John Wiley & Sons
Table of Contents: ... of "temporary" protectionism end in 2009, now what? -- Where T-shirts go after the Salvation Army bin -- How...

32
by Johnson, Harry G.
Published 2013
Routledge
Table of Contents: ...I. The positive theory of tariffs -- II. Tariffs and distortions -- III. The cost of protection...

33
by Butler, Joy R.
Published 2010
Sashay Communications
Table of Contents: ... for the cyber citizen -- Part two, knowing your online rights and responsibilities -- Protecting your online...

34
by Drescher, Daniel
Published 2017
Apress
Table of Contents: ... world -- Identifying and protecting user accounts -- Authorizing transactions -- Storing transaction...

35
by Key, Stephen
Published 2016
McGraw-Hill
Table of Contents: .... Prove your idea -- Part four. Protect your idea -- Part five. Prepare to pitch your idea...

36
by Jones, Phil M.
Published 2018
Wiley
Table of Contents: ... indecision -- 8. Protecting your investment...

37
by McGuire, Russell
Published 2007
John Wiley & Sons
Table of Contents: ... steps -- Digitize -- Connect -- Evaluate -- Limit -- Position -- Protect -- Learn from your customers...

38
by Speed, Tim
Published 2003
Digital Press
Table of Contents: ...The Internet and Security; The Security Review Process; Cryptography; Secure Networks; Protecting...

39
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ..., and PKI -- pt. II. Privacy and security for users. The Web's war on your privacy -- Privacy-protecting...

40
by Delaney, Laurel J.
Published 2014
Apress
Table of Contents: ...Legal Protection in the Online EnvironmentDomain Name Protection: Part of Your IP Protection; Other...