by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
by
Cavanaugh, John C., author.
Format:
Books
Publication Date
2015
Excerpt:
Competence -- Activation Of Stereotypes -- Stereotype Threat -- Current Controversies: Are Stereotypes of
by
Hanusch, Folker, 1975- editor.
Consulta en línea
Table of contents https://www.loc.gov/catdir/enhancements/fy1610/2014024793-t.html
Contributor biographical information https://www.loc.gov/catdir/enhancements/fy1610/2014024793-b.html
Publisher description https://www.loc.gov/catdir/enhancements/fy1610/2014024793-d.html
Table of contents https://www.loc.gov/catdir/enhancements/fy1610/2014024793-t.html
Contributor biographical information https://www.loc.gov/catdir/enhancements/fy1610/2014024793-b.html
Publisher description https://www.loc.gov/catdir/enhancements/fy1610/2014024793-d.html
Format:
Books
Publication Date
2014
Excerpt:
Analyzing Travel Journalism / Wiebke Schoon -- Your Threat or Mine? How Travel Journalists Frame
by
Christensen, Clayton M.
Format:
Books
Publication Date
2011
Excerpt:
Reframing the Higher Education Crisis: 1. The Educational Innovator's Dilemma: Threat of Danger
Limit Search Results
Narrowed by: