熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 42 筆, 頁數 1 / 1
呈現:
The Synergistic Effects of Yoga on Psychological
This survey-based observational study was designed to study an individual’s Yoga experience as it re... more |
|||
The Varangians: In God’’s Holy Fire
This book is the history of the Eastern Vikings, the Rus and the Varangians, from their earliest men... more |
|||
Security, Privacy and User Interaction
PART I: Considering the Typical User.- 1. Mind your SMSes: Mitigating Social Engineering in Second F... more |
|||
The Varangians: In God’’s Holy Fire
This book is the history of the Eastern Vikings, the Rus and the Varangians, from their earliest men... more |
|||
The Troll Inside You: Paranormal Activity in the Medieval North
|
|||
The Routledge Research Companion to the Medieval Icelandic Sagas
The last fifty years have seen a significant change in the focus of saga studies, from a preoccupati... more |
|||
Understanding Social Engineering Based Scams
This book describes trends in email scams and offers tools and techniques to identify such trends. I... more |
|||
Historical Dictionary of Iceland
This third edition of Historical Dictionary of Iceland contains a chronology, an introduction, and a... more |
|||
A History of Water: Series I, Volume 1: Water Control and River Biographies
This volume is the first of three that explore all aspects of water - social, cultural, political, r... more |
|||
Mobile Authentication: Problems and Solutions
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen ... more |
|||
Gesture
In these often quiet but probing poems, Nancy Jakobsson illuminates lives and worlds--her own life and the lives of...... more |
|||
Multi-Pitch Estimation
Periodic signals can be decomposed into sets of sinusoids having frequencies that are integer multip... more |
|||
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective cou... more |
|||
Applied Cryptography And Network Security: Second International Conference, Acns 2004, Yellow Mountain, China, June 8-11, 2004.
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was spo... more |
|||
Translanguaging in Science Education
|
|||
Luxury, Fashion and the Early Modern Idea of Credit
Luxury, Fashion and the Early Modern Idea of Credit addresses how social and cultural ideas about cr... more |
|||
Translanguaging in Science Education
educational contexts (Anders Jakobsson, Pia Nygård Larsson and Annika Karlsson).- Chapter 2. Translanguaging within an integrated...... more |
|||
Defence Planning as Strategic Fact
Defence Planning as Strategic Fact provides and elaborates on an "upstream" focus on the variegated ... more |
|||
Luxury, Fashion and the Early Modern Idea of Credit
Luxury, Fashion and the Early Modern Idea of Credit addresses how social and cultural ideas about cr... more |
|||
Paranormal Encounters in Iceland 1150-1400
This anthology of international scholarship offers new critical approaches to the study of the many ... more |
|||
Defence Planning as Strategic Fact
Defence Planning as Strategic Fact provides and elaborates on an "upstream" focus on the variegated ... more |
|||
The Routledge Research Companion to the Medieval Icelandic Sagas
|
|||
Understanding Social Engineering Based Scams
This book describes trends in email scams and offers tools and techniques to identify such trends. I... more |
|||
Medieval Iceland: Politics, Patronage and Power
At the beginning of this history, in the ninth century, Iceland was uninhabited save for fowl and sm... more |
|||
Playing Oppression: The Legacy of Conquest and Empire in Colonialist Board Games
Mikael Jakobsson apply the incisive frameworks of postcolonial theory to a broad historical survey of board games to show how...... more |
|||
Oil Essentials Secrets: Everything You Need to Know to Get Started, Essential Oils for Health and Healing, 33 Different Essential Oils Recipes
|
|||
Atlas of Submarine Glacial Landforms: Modern, Quaternary and Ancient
|
|||
Sturla Þórðarson: Skald, Chieftain and Lawman
the north and west of the country until 1282. He died on 30 July 1284. Contributors are Ann-Marie Long, rmann Jakobsson...... more |
|||
The Legendary Sagas: Origins and Development
|
|||
A History of Water
|
|||
A Sense of Belonging: Morkinskinna and Icelandic Identity, c. 1220
Morkinskinna is a 13th-century Icelandic saga that portrays the kings who ruled Norway in the 11th a... more |
|||
The Death of the Internet
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to sprea... more |
|||
Anaesthesia for Day Case Surgery
|
|||
Fisheries, Aquaculture and Marine Mammals: Interrelationship, Background and Issues
|
|||
Towards Trustworthy Elections: New Directions in Electronic Voting
For many years now, cryptography has been keeping messages secure for senders, irrespective of the r... more |
|||
Anaesthesia for Day Case Surgery
|
|||
Multi-Pitch Estimation
Periodic signals can be decomposed into sets of sinusoids having frequencies that are integer multip... more |
|||
Images of the North: Histories - Identities - Ideas
|
|||
Crimeware: Understanding New Attacks and Defenses
Jakobsson and Zulfikar Ramzan have brought together chapter contributors who are among the best and the brightest in the...... more |
|||
Understanding Click Fraud
|
|||
Contingent Valuation and Endangered Species: Methodological Issues and Applications
|
|||
Making of the Eastern Vikings: Rus’ and Varangians in the Middle Ages
Historiography on the Vikings of the East - the Rus’ and the Varangians - has been both multiform an... more |