Search alternatives:
"slight" » "sight" (Expand Search)
"slightly" » "sightly" (Expand Search)
"fight" » "might" (Expand Search)
"fights" » "mights" (Expand Search), "rights" (Expand Search), "lights" (Expand Search)
"fightly" » "mightly" (Expand Search)
"fightsssly" » "mightsssly" (Expand Search), "rightsssly" (Expand Search), "lightsssly" (Expand Search)
"fright" » "bright" (Expand Search), "frights" (Expand Search)
"frightssly" » "brightssly" (Expand Search), "frightsly" (Expand Search), "frightsssly" (Expand Search)
"frightsly" » "brightsly" (Expand Search), "frightssly" (Expand Search)
"frightsssly" » "brightsssly" (Expand Search), "frightssly" (Expand Search), "frightsly" (Expand Search), "frightssssly" (Expand Search)
"wrights" » "rights" (Expand Search), "weights" (Expand Search), "wrightss" (Expand Search)
"wrightss" » "rightss" (Expand Search), "weightss" (Expand Search), "rights" (Expand Search), "weights" (Expand Search), "wrights" (Expand Search), "wrightsss" (Expand Search)
"wrightssly" » "rightssly" (Expand Search), "weightssly" (Expand Search), "rightsly" (Expand Search), "weightsly" (Expand Search), "wrightsly" (Expand Search), "wrightsssly" (Expand Search)
"eights" » "weights" (Expand Search), "rights" (Expand Search), "eighth" (Expand Search)
"heights" » "hweights" (Expand Search), "hrights" (Expand Search), "heighth" (Expand Search), "weights" (Expand Search)
"rightss" » "rights" (Expand Search), "rightsss" (Expand Search)
"rightsss" » "rightss" (Expand Search), "rights" (Expand Search), "rightssss" (Expand Search)
"rightssly" » "rightsly" (Expand Search), "rightsssly" (Expand Search)
"rightsssly" » "rightssly" (Expand Search), "rightsly" (Expand Search), "rightssssly" (Expand Search)
"height" » "weight" (Expand Search)
"wright" » "wrights" (Expand Search)
"right" » "rights" (Expand Search)
"slight" » "sight" (Expand Search)
"slightly" » "sightly" (Expand Search)
"fight" » "might" (Expand Search)
"fights" » "mights" (Expand Search), "rights" (Expand Search), "lights" (Expand Search)
"fightly" » "mightly" (Expand Search)
"fightsssly" » "mightsssly" (Expand Search), "rightsssly" (Expand Search), "lightsssly" (Expand Search)
"fright" » "bright" (Expand Search), "frights" (Expand Search)
"frightssly" » "brightssly" (Expand Search), "frightsly" (Expand Search), "frightsssly" (Expand Search)
"frightsly" » "brightsly" (Expand Search), "frightssly" (Expand Search)
"frightsssly" » "brightsssly" (Expand Search), "frightssly" (Expand Search), "frightsly" (Expand Search), "frightssssly" (Expand Search)
"wrights" » "rights" (Expand Search), "weights" (Expand Search), "wrightss" (Expand Search)
"wrightss" » "rightss" (Expand Search), "weightss" (Expand Search), "rights" (Expand Search), "weights" (Expand Search), "wrights" (Expand Search), "wrightsss" (Expand Search)
"wrightssly" » "rightssly" (Expand Search), "weightssly" (Expand Search), "rightsly" (Expand Search), "weightsly" (Expand Search), "wrightsly" (Expand Search), "wrightsssly" (Expand Search)
"eights" » "weights" (Expand Search), "rights" (Expand Search), "eighth" (Expand Search)
"heights" » "hweights" (Expand Search), "hrights" (Expand Search), "heighth" (Expand Search), "weights" (Expand Search)
"rightss" » "rights" (Expand Search), "rightsss" (Expand Search)
"rightsss" » "rightss" (Expand Search), "rights" (Expand Search), "rightssss" (Expand Search)
"rightssly" » "rightsly" (Expand Search), "rightsssly" (Expand Search)
"rightsssly" » "rightssly" (Expand Search), "rightsly" (Expand Search), "rightssssly" (Expand Search)
"height" » "weight" (Expand Search)
"wright" » "wrights" (Expand Search)
"right" » "rights" (Expand Search)
-
142401
CISSP.
Hoboken : John Wiley & Sons, 2012Table of Contents: “…How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control.…”
6th ed.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142402
Think, care, act : teaching for a peaceful future
Charlotte, N.C. : Information Age Pub., 2011Table of Contents: “…t be Neutral on a Moving Train)“A culture of peace will be achieved when citizens of the world understand global problems; have the skills to resolve conflict constructively; know and live by international standards of human rights, gender and racial equality; appreciate cultura ... -- â€?…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142403
Marx on capitalism : the interaction-recognition-antinomy thesis
Leiden ; Boston : Brill, 2018Table of Contents: “…The Agency Problem; 13. The Capitalism, Rights and Injustice Problem; 14. Summary; Chapter 9. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142404
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.
Somerset : John Wiley & Sons, Incorporated, 2017Table of Contents: “…Chapter 3 Data ClassificationData Inventory and Discovery; Data Ownership; The Data Life Cycle; Data Discovery Methods; Jurisdictional Requirements; Data Rights Management; Intellectual Property Protections; DRM Tool Traits; Data Control; Data Retention; Data Audit; Data Destruction/Disposal; Summary; Exam Essentials; Written Labs; Review Questions; Chapter 4 Cloud Data Security; Cloud Data Life Cycle; Create; Store; Use; Share; Archive; Destroy; Cloud Storage Architectures; Volume Storage: File-Based Storage and Block Storage; Object-Based Storage; Databases; Content Delivery Network (CDN).…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
142405
Marketing
New York : McGraw Hill Education, 2017Table of Contents: “…Integrated marketing communications -- Communicating with consumers -- The AIDA Model -- Turning a classic campaign into a mobile event -- Advertising -- Public relations -- Consumer Privacy Bill of Rights -- 18. Advertising, public relations, and sales management -- Target audience -- Advertising objectives -- Advertising budget -- Assess impact using marketing metrics -- Regulatory and ethical issues in advertising -- Public relations -- Sales promotion -- 19. …”
Fifth edition.
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
142406
100 ready-to-use pathfinders for the Web : a guidebook and CD-ROM
New York : Neal-Schuman Publishers, 2005Table of Contents: “…Travel information --- 88. U.S. civil rights --- 89. U.S. civil war --- 90. U.S. Congress --- 91. …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
142407
Critical library pedagogy handbook. Volume 1, Essays and workbook activities
Chicago, Illinois : Association of College and Research Libraries, a division of the American Library Association, 2016Table of Contents: “…Nicholson -- At odds with assessment : being a critical educator within the academy / Carolyn Caffrey Gardner and Rebecca Halpern -- What standards do and what they don't / Emily Drabinski and Meghan Sitar -- Barriers to critical pedagogy in information literacy teaching / Gr Keer -- Loading examples to further human rights education / Lisa Janicke Hinchliffe -- Social constructivism and critical information literacy / Jessica Critten and Andrea G. …”
Format: Electronic eBookAccess E-Book
-
142408
Road Ahead : Transition to Adult Life for Persons with Disabilities.
IOS Press, 2013Table of Contents: “…Philosophical/Ethical Judgment; 1.2. Civil Rights; 1.3. Normalization; 1.4. Community Participation; 1.5. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142409
Congress and the CIA
New York : Nova Science Pub., 2009Table of Contents:Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142410
Indo-US Nuclear Deal : Seeking Synergy in Bilateralism.
Hoboken : Taylor and Francis, 2014Table of Contents: “…Safeguards Agreement and Fuel AssurancesIntegrity and Reliability of our Strategic Programme; Moratorium on Production of Fissile Material; Non-Discriminatory Global Nuclear Disarmament; Cessation of Future Cooperation; 123 Agreement; The Return Clause; Reprocessing Rights; Testing; Lifetime Fuel Guarantee; India-Specific Safeguards Agreement (ISSA); NSG Waiver; The Civil Liability for Nuclear Damage Bill 2010; Conclusion; 7. …”
2nd ed.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142411
Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources
New York, NY : Apress, 2022Table of Contents: “…Chapter 4: Cloud Definitions -- Availability -- Identity -- Accounts -- Principals -- Secrets -- Secrets Management -- Virtual Private Cloud (VPC) -- Entitlements -- Privileges -- Rights -- Roles -- Certificates -- Resources -- Certificate Authorities -- Permissions -- Containers -- Segmentation -- Microsegmentation -- Instances -- Single Tenant -- Multitenant -- Edge Computing -- Breach -- Recovery Point Objective and Recovery Time Objective -- Others -- S3 Bucket -- EC2 -- E5 -- Kubernetes -- Docker -- SCIM -- Service Fabric -- Directory Bridging -- DevOps Security (SecDevOps)…”
[First edition].
Format: Electronic eBookFull text (Wentworth users only)
-
142412
Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. AI, Product and Service 12th International Conference, DHM 2021, Held as Part of the 23rd...
Cham : Springer International Publishing : Imprint: Springer, 2021Table of Contents: “…Rethinking Healthcare -- Development and Testing of a Usability Checklist for the Evaluation of Control Interfaces of Electrical Medical Beds -- Kits for Patients with Transtibial Amputation in the Pre- and Post-Prosthetic Phases -- Research on Social Innovation Design of SCD Pre-hospital Emergency Equipment Based on IoT Technology -- Towards a Practical Approach for Assessing Pressure Relief Activities for Manual Wheelchair Users in their Daily Lives -- Principles for Designing an mHealth App for Participatory Research and Management of Chronic Pain -- Automated Escalation and Incident Management in Healthcare during Mass Casualties and Pandemic Events -- Different Patterns of Medication Administration between Inside and Outside the Patient Room using Electronic Medical Record Log Data -- Systematic Review of The Importance of Human Factors in Incorporating Healthcare Automation -- Scenario Planning in Healthcare Development in the VUCA World -- The Digital Dilemma and the Healthy Nation -- Development of Autonomous UVC Disinfectant Robot -- Requirements for a Game-Based Approach to Strengthen Leadership in Health Care -- Towards an Effective Web-based Virtual Health Intervention: The Impact of Media Platform, Visual Framing, and Race on Social Presence and Transportation Ratings -- The Design of Outpatient Services in Children's Hospitals based on the Double Diamond Model -- Artificial Intelligence Applications and Ethical Issues -- Brown Hands Aren’t Terrorists: Challenges in Image Classification of Violent Extremist Content -- A Βibliometric Analysis of Intelligent Agent Researches during 2010 ~ 2020 based on VOS Viewer -- What if: Human Rights vs Science – or Both? An Unusual Argument from a Disability Perspective -- Sources of Risk and Design Principles of Trustworthy Artificial Intelligence -- Analysis of the Application of Artificial Intelligence in the Creative Space -- Benchmarking Robots by Inducing Failures in Competition Scenarios -- Fairness and the Need for Regulation of AI in Medicine, Teaching, and Recruiting -- Digital Human Modeling in Product and Service Design -- Research on Tourism Marketing Based on Community E-commerce -- An Empirical Study of the Influencing Factors on User Experience for Barrage Video Website — A Case Study of Bilibili -- Application of Design Thinking in the Education Segment, Regarding the Human-Computer Interactions -- Learning Effectiveness Evaluation of Lesson Plan on Streamline in Model Design Course -- Comprehensive Study of Digital Restoration of Buddha Statues in Qingzhou by 3D Technology -- Influence of the Color and Logo Position of HNB Products on User Experience Based on Eye Tracking -- A Study on the Effect of Online Vertical Searching Advertising Presence towards Customer Behavioral Intentions -- Influence of HNB Product Packaging Health Warning Design on Risk Perception Based on Eye Tracking -- The Influence of the Aesthetic Design of Taobao APP on Users' Emotional Experience -- Research on Chinese Traditional Garden Immersive Aesthetic Experience in the Era of Artificial Intelligence.…”
1st ed. 2021.
Format: Electronic eBookFull text (Wentworth users only)
Full text (Wentworth users only)
-
142413
Challenges for the Democratisation Process in Tanzania : Moving towards consolidation years after independence?.
Oxford : Mkuki na Nyota Publishers, 2013Table of Contents: “…ndings; 5.4 The legal setting: the constitution, the judiciary and human rights; 5.5 Corruption & nepotism/clientele networks; 5.6 Decision-making in an aid dependent country-challenges for democratisation; 5.7 Conclusion; 6. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142414
McClellan's Own Story.
Scituate : La Vergne : Digital Scanning, Inc. Ingram Book Co. [distributor] 1999Table of Contents: “…Prime August 10, 1886""; ""INTRODUCTION""; ""CHAPTER I""; ""STATE RIGHTS AND SECESSION""; ""SLAVERY""; ""McCLELLANâ€?…”
Reprint.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142415
Social policy : an introduction
Maidenhead, Berkshire : Open University Press, 2013Table of Contents: “…; The story of social policy; Conclusions: the subject today; Suggestions for further reading; 2 Ideas and concepts in social policy; Key learning outcomes; Overview of the chapter; Social policy principles; Equality, equity and justice; Need; Freedom and rights; Conclusions; Summary of key points.…”
Fourth edition.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142416
The death penalty in America : current controversies
New York : Oxford University Press, 1997Table of Contents: “…Richards -- Why the death penalty is a cruel and unusual punishment ; Habeas corpus and other constitutional controversies ; International human rights law and the death penalty in America / H.A. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142417
Islamic capital markets a comparative approach
Singapore : Wiley, 2013Table of Contents: “…; 1.12: Islamic Finance: The Foundations; 1.13: Islamic Rules Governing Exchange; 1.13.1: Property Rights; 1.13.2: Contracts and Trust; 1.13.3: Markets; 1.13.4: Markets of the Prophet; 1.14: Islamic Financial Markets and Instruments; 1.15: Islamic Finance Industry at Present; 1.16: What Does the ""Paper Economy"" Look Like Today, Some Five Years After the Crisis?…”
Format: Electronic eBookFull text (Wentworth users only)
-
142418
European Union and trade barriers in Europe
New York : Nova Science Publishers, Inc., 2008Table of Contents: “…United Kingdom (UK)France; CANNED FRUIT SUBSIDIES; WOOD INDUSTRY SUBSIDIES; INTELLECTUAL PROPERTY RIGHTS (IPR)PROTECTION; OVERVIEW; DESIGNS; PATENTS; DATA EXCLUSIVITY; Bulgaria; Hungary; Poland; Portugal; PATENTING OF BIOTECHNOLOGICAL INVENTIONS; TRADEMARKS; MADRID PROTOCOL; GEOGRAPHICAL INDICATIONS (GI); ADDITIONAL MEMBER STATE PRACTICES; Belgium; Bulgaria; Cyprus; Czech Republic; France; Germany; Greece; Hungary; Italy; Lithuania; Poland; Romania; Spain; Sweden; SERVICES BARRIERS; CONCERNS RELATED TO EU ENLARGEMENT; TELEVISION BROADCAST DIRECTIVE (TELEVISIONWITHOUT FRONTIERS DIRECTIVE).…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142419
Gender violence interdisciplinary perspectives
New York : New York University Press, 2007Table of Contents: “…/ Louise Armstrong -- "Philadelphia story : September 1987" / Kathleen O'Toole -- Pornography, civil rights, and speech / Catharine MacKinnon -- Pornography and Black women's bodies / Patricia Hill Collins -- Pornography and the alienation of male sexuality / Harry Brod -- Problematizing the discourse : sex trafficking and ethnography / Anastasia M. …”
2nd ed.
Format: Electronic eBookAccess E-Book
-
142420
Performance Measurement and Management Control : the Relevance of Performance Measurement and Management Control Research.
Bingley : Emerald Publishing Limited, 2018Table of Contents: “…Decentralization of Decision Rights; 2.3. Relation between Decentralization and Internal Control.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)