Books on the topic 'Renseignements commerciaux confidentiels'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 books for your research on the topic 'Renseignements commerciaux confidentiels.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Ghernaouti-Helie, Solange, and Igli Tashi. Information Security Evaluation: A Holistic Approach from a Business Perspective. Taylor & Francis Group, 2011.
Find full textGhernaouti-Helie, Solange, and Igli Tashi. Information Security Evaluation: A Holistic Approach from a Business Perspective. Taylor & Francis Group, 2011.
Find full textInformation Security Evaluation: A Holistic Approach from a Business Perspective. Taylor & Francis Group, 2011.
Find full textHelie, Solange Ghernaouti. Information Security Evaluation. Presses Polytechniques et Universitaires Romandes, 2021.
Find full textCerra, Allison. Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security. Wiley & Sons, Limited, John, 2019.
Find full textCybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security. Wiley & Sons, Incorporated, John, 2019.
Find full textSecurity and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publishers, Incorporated, 2016.
Find full textRai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Taylor & Francis Group, 2016.
Find full textRai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publishers, Incorporated, 2016.
Find full textRai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publishers, Incorporated, 2016.
Find full textRai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publishers, Incorporated, 2016.
Find full textIT security governance guidebook with security program metrics on CD-ROM. Boca Raton, FL: Auerbach Publications/Taylor & Francis, 2007.
Find full textVerma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.
Find full textVerma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age. Taylor & Francis Group, 2020.
Find full textVerma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.
Find full textVerma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.
Find full textVerma, Rahul, Divya Gupta Chowdhry, and Manisha Mathur. Evolution of Business in the Cyber Age. Taylor & Francis Group, 2021.
Find full textEvolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. Apple Academic Press, Incorporated, 2020.
Find full text