164 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for Victimology : theories and applications
by 
Burgess, Ann Wolbert.
Format: 
Books
Publication Date 
2013
Excerpt: 
exploitation -- School violence -- Intimate partner violence -- Stalking victims -- Victims of rape and sexual
Available: Copies:
by 
Goldstein, Sam, 1952-
Format: 
Books
Publication Date 
2013
Excerpt: 
increasing threats of poverty, exploitation, and trauma. Central to growing up successfully is learning to
Available: Copies:
by 
Monks, Erin Kate.
Format: 
Manuscript
Publication Date 
2013
Excerpt: 
Orgasmic or organic : an exploration into whether customer's preceived quality of organically
Available: Copies:
by 
Veitch, Emily Frances.
Format: 
Manuscript
Publication Date 
2012
Excerpt: 
Best laid plans : an exploration into the process of designing a content strategy for social media
Available: Copies:
by 
Malan, Philippus.
Format: 
Manuscript
Publication Date 
2012
Excerpt: 
What are we really buying, product or experience? : an exploration of sensory marketing tactics
Available: Copies:
by 
Denny, Lincon.
Format: 
Manuscript
Publication Date 
2012
Excerpt: 
A sensory experience : an exploration of the power of brand experiences as opposed to traditional
Available: Copies:
9. 
Cover image for Exploring Adobe Photoshop CS5
by 
Hartman, Annesa, 1968-
Format: 
Books
Publication Date 
2011
Excerpt: 
Design exploration series.
Available: Copies:
10. 
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
by 
Gragido, Will.
Format: 
Books
Publication Date 
2011
Excerpt: 
execution of advanced attacks, their success from the perspective of exploitation and their presence within
Available: Copies:
by 
Maurer, Eva, 1972-
Format: 
Books
Publication Date 
2011
Excerpt: 
Outer space -- Exploration -- Russia (Federation) -- History.
Available: Copies:
by 
Pyrek, Kelly.
Format: 
Books
Publication Date 
2011
Excerpt: 
Contents: Healthcare trends, stressors, and workplace violence -- Patient privacy and exploitation
Available: Copies:
Limit Search Results
Author
Language
Subject
Item Available