by
Piotrowski, Christine M., 1947-
Format:
Books
Publication Date
2013
Excerpt:
; Intentional torts ; Intellectual property, copyright ; Code compliance -- Where do designers work? : How do
by
Solingen, Etel, 1952-
Format:
Books
Publication Date
2012
Excerpt:
different groups? How, when and why were those effects translated into compliance with non
by
Xiao, Weibing.
Format:
Books
Publication Date
2012
Excerpt:
reform in China -- China's limited push model of FOI legislation -- Compliance with proactive disclosure
by
Narlikar, Amrita.
Format:
Books
Publication Date
2012
Excerpt:
at the WTO, Gregory Shaffer and Joel Trachtman -- 25. The DSM: Ensuring Compliance?, Alan O. Sykes
by
Gathegi, John Ng'ang'a. (FrPBN)16614950
Notice et cote du catalogue de la Bibliothèque nationale de France http://catalogue.bnf.fr/ark:/12148/cb424938425
Format:
Books
Publication Date
2012
Excerpt:
-reference compilation of notable points from each chapter ; Appendix 4. Quick-reference compilation of compliance
by
Rieves, Ralph A.
Format:
Books
Publication Date
2012
Excerpt:
complementary parts-The Investor Universe, Compliance and Disclosure, and Corporate Practices-this comprehensive
by
Flynn, Nancy, 1956-
Format:
Books
Publication Date
2012
Excerpt:
-Discovery Compliantly -- 4.Regulatory Compliance: Government and Industry Watchdogs Keep an Eye on the Social Web -- 5
by
Smith, Roy C., 1938-
Format:
Books
Publication Date
2012
Excerpt:
. 15 Dealing with Regulatory and Compliance Issues -- ch. 16 Strategy and Strategic Positioning -- ch
by
Water Environment Federation
Format:
Books
Publication Date
2012
Excerpt:
.Environmental Compliance Audits -- 5.2.Analysis of Sudden Releases -- 6.0.HAZARD ANALYSIS FOR SECURITY -- 6.1
by
Atkinson, Paul (Software engineer)
Format:
Electronic Resources
Publication Date
2012
Excerpt:
compliance, data replication, and data warehouse performance improvementsAddresses essential topics including
by
Meyers, Mike, 1961-
Format:
Books
Publication Date
2012
Excerpt:
classification and compliance -- Reporting -- 802 -- Network security -- Malicious software -- Malware signs and
by
Cobb, Anthony T.
Format:
Books
Publication Date
2012
Excerpt:
-- Endnotes -- Key Terms -- Figure 3.1: Illustration of a Work Breakdown Structure for Golden Years Compliance
Limit Search Results