255 Results Found Subscribe to search results
000000000000IIE
Print
1. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
.Assets / M.G. Jaatun / I.A. Tondel / P.H. Meland / J. Jensen -- 10.2.1.Asset Identification / P.H. Meland
Available: Copies:
by 
Boon, P. J.
Format: 
Books
Publication Date 
2012
Excerpt: 
, Information-Based Approach to the Identification of High Value Sites for River Conservation in New Zealand
Available: Copies:
by 
Water Environment Federation
Format: 
Books
Publication Date 
2012
Excerpt: 
Contents note continued: 8.1.U.S. Environmental Protection Agency Identification Numbers -- 8.2
Available: Copies:
by 
Bowler, Shaun, 1958-
Format: 
Books
Publication Date 
2012
Excerpt: 
minority vote -- Party identification and two-party vote among minority citizens -- The political
Available: Copies:
5. 
Cover image for Brand management : Principles and Practices
by 
Dutta, Kirti.
Format: 
Books
Publication Date 
2012
Excerpt: 
-- Identification of brand benefits -- Consumer behaviour and changing consumer trends -- Competitor analysis
Available: Copies:
6. 
Cover image for Entrepreneurship and how to establish your own business
by 
Strydom, J. W. (Johan Wilhelm), 1952-
Format: 
Books
Publication Date 
2012
Excerpt: 
Nieuwenhuizen -- Basic business concepts and the business environment / Andreas de Beer -- The identification
Available: Copies:
by 
Thomas, Anita Jones.
Format: 
Books
Publication Date 
2011
Excerpt: 
Social Identification.
Available: Copies:
by 
Goodwin, William (William H.)
Format: 
Books
Publication Date 
2011
Excerpt: 
A new chapter looking at non-human forensic genetics, including identification of bacteria and
Available: Copies:
by 
Altheide, Cory.
Format: 
Books
Publication Date 
2011
Excerpt: 
-- Content Identification -- Content Examination -- Metadata Extraction -- Images -- JPEG -- GIF -- PNG
Available: Copies:
by 
Dahlman, Erik.
Format: 
Books
Publication Date 
2011
Excerpt: 
Transmission -- 14.3.2.Step 2: Random-Access Response -- 14.3.3.Step 3: Terminal Identification -- 14.3.4.Step
Available: Copies:
by 
Nieuwenhuizen, C. (Cecile)
Format: 
Books
Publication Date 
2011
Excerpt: 
small, medium and micro enterprises (SMMEs) in perspective -- Chapter 3: The identification of feasible
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available