1
by Ticher, Paul
Published 2018
IT Governance Publishing
Subjects: ...Data protection / Law and legislation / European Union countries...

2
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

3
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

4
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

5
by Limited, Assemble You
Published 2022
Assemble You
... of protecting your team, when you should do it and what they may need protection from. It's all about ensuring...

6
by Gaschler, Andre
Published 2019
IBM Corporation, IBM Redbooks
...Spectrum Protect Plus...

7
by Lallement, Rémi
Published 2017
ISTE
Table of Contents: ...Front Matter -- The Rationale of the System and the Diversity of the Forms of Protection -- How...

8
by Barringer, Bruce R.
Published 2011
FTPress Delivers

9
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

10
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

11
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

12
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

13
by Henriksen, Nicolai
Published 2016
Packt

14
by Brown, Karen A., Hyer, Nancy Lea, Ettenson, Richard
Published 2017
MIT Sloan Management Review

15
by Wright, Christopher
Published 2019
IT Governance Publishing

16
by Wright, Christopher
Published 2023
IT Governance Publishing
...How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective...

17
by Rinaldo, Carlotta
Published 2020
Routledge
..."Business Negotiations and the Law: The Protection of Weak Professional Parties in Standard Form...

18
by Allen, Mark, Cervo, Dalton
Published 2015
Morgan Kaufmann
Subjects: ...Data protection / fast...

19
by Lucas, Stuart E.
Published 2013
FT Press
Table of Contents: ...Protecting and growing your wealth -- Eight principles of strategic wealth management -- Start...

20
by Davies, Joseph
Published 2008
Microsoft Press
Table of Contents: ... Connections -- 13. Site-to-Site VPN Connections -- pt. IV. Network Access Protection Infrastructure -- 14...