Search alternatives:
"protectionism" » "protections"

24101
Published 1996
Springer US
..., and the risk and protective factors that con­ tribute to these differences in health outcomes (National Center...

24102
Published 1982
Springer US
... the war to protect the workers and the results of this work were quite excellent, very few installations...

24103
Published 1983
Springer Berlin Heidelberg
... through the skin and on its protective role in the prevention of penetration by pathogens or harmful...

24104
Published 1993
Springer Berlin Heidelberg
... of environmental planning should enhance our ability to protect our future. The depletion of the earth's natural...

24105
Published 1999
Springer Netherlands
... of years, having a potentially significant impact on global climate change. Sediments also protect coasts...

24106
Published 2016
Springer Japan
... in mountains, policymakers planning ecosystem management of protected areas, and researchers of general ecology...

24107
by Bouis, Romain
Published 2016
International Monetary Fund
... of the historically most protected non-manufacturing industries. It relies on a unique mapping between new annual data...

24108
Published 2014
Springer US
... document the complex interplay of risk and protective factors and other variables contributing to normal...

24109
Published 2016
Springer International Publishing
... aspects of Mediterranean forest systems and to protecting these critical resources...

24110
Published 2014
National Academies Press
... and Their Families evaluates risk and protective factors in military and family populations and suggests...

24111
by Boggiano, Tracy., Fritchey, Grant.
Published 2019
Apress
... in performance. Query Store for SQL Server 2019 helps you protect your database's performance during upgrades...

24112
by Gillis, Tom
Published 2010
Cisco Press
... sizes: information and techniques for protecting collaborative systems without compromising...

24113
by Chatterjee, Rithik
Published 2021
Apress
... protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics...

24114
by Talaat, Sherif, Ishac, Wagdy
Published 2015
Apress
... HDInsight Deploy, configure, and manage a Microsoft Azure SQL Database Protect and secure identities...

24115
by Yaworski, Peter
Published 2019
No Starch Press
...) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web...

24116
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
... perspective on the risk assessment process. It also provides food for thought on protecting an organizations...

24117
by Steele, Julie
Published 2016
O'Reilly Media
... (CDO), not only to manage the way they gather, store, and protect data, but also to generate new...

24118
by Alcorn, Wade
Published 2014
Wiley
... are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all...

24119
by Leonhard, Woody
Published 2015
John Wiley and Sons, Inc.
... on protecting your data, your computer, and your identity. Whether you're a businessperson looking to use...

24120
by Doraswamy, Naganand, Harkins, Dan
Published 2003
Pearson
... to protect all your digital assets, wherever they are-on the Internet, your intranet, your extranet, or your...