Search alternatives:
"protections" » "projections", "protecting"

1
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Data protection / http://id.loc.gov/authorities/subjects/sh85035859...

2
Published 2021
Addison-Wesley Professional
Subjects: ...Data protection / fast / (OCoLC)fst00887958...

3
by Ticher, Paul
Published 2018
IT Governance Publishing
Subjects: ...Data protection / Law and legislation / European Union countries...

4
by Preston, W. Curtis
Published 2021
O'Reilly Media
Table of Contents: ... protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery...

5
by Lallement, Rémi
Published 2017
ISTE
Table of Contents: ...Front Matter -- The Rationale of the System and the Diversity of the Forms of Protection -- How...

6
by Gaschler, Andre
Published 2019
IBM Corporation, IBM Redbooks
...Spectrum Protect Plus...

7
by Limited, Assemble You
Published 2022
Assemble You
... of protecting your team, when you should do it and what they may need protection from. It's all about ensuring...

8
Published 2022
Palgrave Macmillan
Table of Contents: ... and its consequences on social protection: A Theoretical Frame -- 1. Ylenia Curzi, Tommaso Fabbri...

9
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

10
by Speed, Tyler Justin
Published 2012
CRC Press
..."Supplying a high-level overview of how to protect your company's physical and intangible assets...

11
by Garcia, Mary Lynn
Published 2008
Elsevier/Butterworth-Heinemann
Table of Contents: ...Part 1. Determining system objectives -- Part. 2. Design physical protection system -- Part 3...

12
by Hay, Bruce L.
Published 2005
Resources for the Future
Table of Contents: ... -- On Portney's complaint / Daniel C. Esty -- Environmental protection and the social responsibility of firms...

13
by Barringer, Bruce R.
Published 2011
FTPress Delivers

14
by Mechora, Špela
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
... considers the development and application of alternative, environmental-friendly, plant protection methods...

15
by Henriksen, Nicolai
Published 2016
Packt

16
by Brown, Karen A., Hyer, Nancy Lea, Ettenson, Richard
Published 2017
MIT Sloan Management Review

17
by Wright, Christopher
Published 2019
IT Governance Publishing

18
by Wright, Christopher
Published 2023
IT Governance Publishing
...How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective...

19
by Lucas, Stuart E.
Published 2013
FT Press
Table of Contents: ...Protecting and growing your wealth -- Eight principles of strategic wealth management -- Start...

20
by Davies, Joseph
Published 2008
Microsoft Press
Table of Contents: ... Connections -- 13. Site-to-Site VPN Connections -- pt. IV. Network Access Protection Infrastructure -- 14...