201
Published 2017
Springer International Publishing
Table of Contents: ... -- Data Science and Security -- Data Stream Mining Based-Outlier Prediction for Cloud Computing...

202
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Procurement Process -- The Case for Improvisation in Information Security Risk Management -- BPM-in-the-Large...

203
by Gronbach, Kenneth W.
Published 2008
American Management Association
Table of Contents: ... it! -- Social security and private health care: dead but not buried -- Wal-Mart hits a wall, a Great Wall...

204
Published 2004
Springer US
Table of Contents: ... Security Council -- Knowledge in E-Government -- E-Governance -- Democracy in the Electronic Government Era...

205
Published 2008
Springer US
Table of Contents: ... the notions of equivalence and equality in algebra -- PITO: A Children-FriendlyInterface for Security Tools...

206
by Golec, Chris
Published 2019
John Wiley & Sons, Incorporated
Table of Contents: ... the List Owner; Start Where It's Natural; Secure Provisional Agreement; Update Your List Regularly; Begin...

207
by Vliet, Jurg van
Published 2011
O'Reilly
Table of Contents: ...); Instances; AMIs; Elastic Block Store; Security Groups; Elastic Load Balancers; Key Pairs; Other AWS Services...

208
by Shackelford, Adam
Published 2015
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... Deployment; Read Replicas; Provisioned IOPS Storage; DB Security Groups; Creating an RDS Database; Instance...

209
by Harper, Frédéric
Published 2015
Apress, Distributed to the Book trade worldwide by Springer Science and Business Media
Table of Contents: ...; Let the Fun Begin; Chapter 2: I'm Not a Rock Star; You Are Not Indispensable; No Job Is Secure; New...

210
by Townsend, Heather
Published 2014
Pearson
Table of Contents: ...? -- How to successfully secure speaking engagements -- Chapter 9: Using PR to open doors -- The different...

211
by Rauland, Patrick
Published 2024
Packt Publishing Ltd.
..., sales management, POS integration, speed optimization, themes, landing pages, plugins, security...

212
Published 2016
John Wiley & Sons
Table of Contents: ... and Alan Wilson -- Space-time analysis of point patterns in crime and security events / Toby Davies, Shane...

213
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... -- A Proposed Intelligent Policy-Based Interface for a Mobile eHealth Environment -- Security and Trust...

214
Published 2006
Gabler Verlag
Table of Contents: ...Secured und Controlled Distribution — Die Industrie als Einzelhändler -- Franchising als...

215
by MacGregor, Allan
Published 2015
Packt Publishing
Table of Contents: ... -- Securing the API -- Summary...

216
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...: Challenges on Data and Information Security -- Development of a Sensor Network System for Industrial...

217
by Kostojohn, Scott
Published 2011
Apress
Table of Contents: ... Application Functionality; Customers; Marketing; Sales; Service; Security; Configuration and Customization...

218
by Bade, Donna L.
Published 2015
AMACOM, American Management Association
Table of Contents: ...'s Invoices; V. Air Cargo Security and C-TPAT; Chapter 5 Export Controls and Licenses; A. Introduction; B...

219
by Sinha, Rajesh
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ... the Top -- Getting to the Next Level -- Regulatory Stumbling Blocks -- Security Concerns -- Pathways...

220
by Collier, Marsha
Published 2013
John Wiley & Sons
Table of Contents: ... Payment Promptly and Securely; Contacting the Seller...