byÂ
Chartered Institute of Management Accountants, issuing body.
Format:Â
Books
Publication DateÂ
2022
Excerpt:Â
control -- Internal audit -- Cyber security threats -- Cyber security processes -- Cyber security tools
byÂ
Kuwali, Dan, editor.
Format:Â
Books
Publication DateÂ
2022
Excerpt:Â
Internal security -- Africa -- History -- 21st century.
byÂ
KAPLAN.
Format:Â
Books
Publication DateÂ
2020
Excerpt:Â
control -- Internal audit -- Cyber security threats -- Cyber security processes -- Cyber security tools
byÂ
Chartered Institute of Management Accountants, issuing body.
Format:Â
Books
Publication DateÂ
2019
Excerpt:Â
control -- Internal audit -- Cyber security threats -- Cyber security processes -- Cyber security tools
byÂ
Nagel, C. J., author, editor, honoree
Format:Â
Books
Publication DateÂ
2019
Excerpt:Â
, engineering and services contracts -- Alternative dispute resolution -- Security -- General introduction and
byÂ
Nagel, C. J.
Format:Â
Books
Publication DateÂ
2015
Excerpt:Â
-- Introduction to close corporations -- Membership and member's interest -- Internal and external relations
byÂ
Shaw, Malcolm N. (Malcolm Nathan), 1947- author.
Format:Â
Books
Publication DateÂ
2014
Excerpt:Â
-- Suggestions for further reading -- 22.The United Nations -- The UN system -- The Security Council -- The
byÂ
Bourne, Mike, 1975-, author.
Format:Â
Books
Publication DateÂ
2014
Excerpt:Â
Understanding security / Bourne, Mike, 1975-, author.
byÂ
Drieskens, Edith, editor.
Format:Â
Books
Publication DateÂ
2014
Excerpt:Â
The EU and effective multilateralism : internal and external reform practices / Drieskens, Edith
byÂ
Kolb, Robert.
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
humanitarian law and human rights rules in agreements regulating or terminating an internal armed conflict
byÂ
Misra, Anmol.
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
Android security : attacks and defenses / Misra, Anmol.
byÂ
Cottey, Andrew.
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
Security in 21st century Europe / Cottey, Andrew.
byÂ
Wallensteen, Peter, 1945-
Table of contents only http://www.loc.gov/catdir/toc/fy12pdf02/2011924400.html
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
Internal Security Dilemma -- 6.5.State Failure, State Reconstruction and Non-state Terrorism -- 6.6.Civil
byÂ
McKercher, B. J. C., 1950-
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
international security / Oliver Walton -- 38.Soft power: overcoming the limits of a concept / Kostas Ifantis.
byÂ
Shiva Kumar, A. K.
Format:Â
Books
Publication DateÂ
2010
Excerpt:Â
, uneven human development, adverse sex ratios, growing urbanization, and internal rural-to-urban migration
byÂ
Kagwanja, Peter.
Format:Â
Books
Publication DateÂ
2009
Excerpt:Â
. Specifically, the paper examines Pretoria's involvement in Africa, and its internal capacity to support its
byÂ
Cawthra, Gavin.
Format:Â
Books
Publication DateÂ
2009
Excerpt:Â
Internal security -- Africa.
byÂ
Kaim, Markus, 1968-
Table of contents only http://www.loc.gov/catdir/toc/ecip089/2008003429.html
Format:Â
Books
Publication DateÂ
2008
Excerpt:Â
Persian Gulf : internal factors-external challenges / Henner Fürtig -- From local to global jihad and back
byÂ
Wood, Jennifer.
Format:Â
Books
Publication DateÂ
2007
Excerpt:Â
Internal security.
byÂ
Purpura, Philip P., 1950-
Format:Â
Books
Publication DateÂ
2007
Excerpt:Â
Internal security -- United States -- Textbooks.
byÂ
Lipman, Frederick D.
Table of contents only http://www.loc.gov/catdir/toc/ecip0610/2006008675.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
changing the corporate culture -- The internal audit function -- Compensation committees of public, private
byÂ
Biegelman, Martin T.
Table of contents http://www.loc.gov/catdir/toc/ecip0516/2005020432.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0622/2005020432-d.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0622/2005020432-d.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Executive roadmap to fraud prevention and internal control : creating a culture of compliance /
byÂ
Wood, Jennifer.
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Internal security.
byÂ
Dupont, Benoît.
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Internal security -- Government policy.
byÂ
Caplan, Richard (Richard D.)
Table of contents http://www.loc.gov/catdir/toc/ecip052/2004024297.html
Format:Â
Books
Publication DateÂ
2005
Excerpt:Â
and internal security -- Refugees and internally displaced persons -- Civil administration
byÂ
Baer, Martha.
Format:Â
Books
Publication DateÂ
2005
Excerpt:Â
Internal security -- United States -- History.
byÂ
Bic, Lubomir, 1951-
Format:Â
Books
Publication DateÂ
2003
Excerpt:Â
. Input/Output Systems -- Pt. 4. Protection and Security. The Protection and Security Interface. Internal
byÂ
Peterson, Edward N. (Edward Norman), 1925-
Format:Â
Books
Publication DateÂ
2002
Excerpt:Â
Internal security -- Germany (East)
byÂ
Bodnar, George H.
Format:Â
Books
Publication DateÂ
2001
Excerpt:Â
-- Analysis of Internal Control Processes -- Information Systems Security -- An Overview of Information
byÂ
Deitel, Harvey M., 1945-
Format:Â
Books
Publication DateÂ
2001
Excerpt:Â
Infrastructure, Certificates and Certification Authorities Cryptanalysis Security Protocols Security Attacks
byÂ
Koehler, John O.
Format:Â
Books
Publication DateÂ
1999
Excerpt:Â
programs for internal repression, international espionage, terrorism and terrorist training, art theft, and
byÂ
Garton Ash, Timothy.
Publisher description http://www.loc.gov/catdir/description/random043/98026444.html
Format:Â
Books
Publication DateÂ
1998 1997
Excerpt:Â
Internal security -- Germany (East)
byÂ
Cannon, Scott R.
Format:Â
Books
Publication DateÂ
1997
Excerpt:Â
; Internal representations, pointers, and dynamic memory; Ethics, privacy, security, and the Internet.
byÂ
Van Horne, James C.
Table of contents http://www.gbv.de/dms/bowker/toc/9780133220742.pdf
Format:Â
Books
Publication DateÂ
1992
Excerpt:Â
-- Information to Analyze an Acquisition -- Multiple Internal Rates of Return -- Risk and Real Options in Capital