Mostrando 361 - 380 Resultados de 546 Para Buscar '"Isis"', tiempo de consulta: 0.07s Limitar resultados
  1. 361
  2. 362
  3. 363
    Publicado 2017
    “…Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. …”
    Libro electrónico
  4. 364
    por Günther, Christoph, author
    Publicado 2020
    “…ISIS is often described as a terrorist organisation that uses social media to empower its supporters and reinforce its message. …”
    Libro electrónico
  5. 365
    Publicado 2015
    “…‧學習主要的行動支付架構:NFC、雲端和封閉式 ‧比較 Google Wallet、Isis、Square、PayPal 和其他支付應用程式的優缺點 ‧提供詳細說明、展示和簡單的註冊來快速取得新用戶的信任 ‧使用 NFC、QR 碼、條碼或地理定位設計有效率的銷售端點互動 ‧加入一些周邊服務,例如點數、優惠券和特價以及理財…”
    Libro electrónico
  6. 366
  7. 367
  8. 368
    Publicado 2016
    Tabla de Contenidos: “…/ Lorenzo Vigentini, Simon McIntyre, Negin Mirriahi, and Dennis Alonzo -- Understanding communication patterns in MOOCs: Combining data mining and qualitative methods / Rebecca Eynon, Isis Hjorth, Taha Yasseri, and Nabeel Gillani -- An example of data mining: Exploring the relationship between applicant attributes and academic measures of success in a pharmacy program / Dion Brocks and Ken Cor -- A new way of seeing: Using a data mining approach to understand children's views of diversity and "difference" in picture books / Robin A. …”
    Libro electrónico
  9. 369
    por Simon, Marvin Kenneth, 1939-
    Publicado 2003
    Tabla de Contenidos: “…3.6.1 Symbol-by-Symbol Detection3.6.2 Average Bit-Error Probability Performance; 3.6.3 Further Receiver Simplifications and FQPSK-B Performance; 3.7 Cross-Correlated Trellis-Coded Quadrature Modulation; 3.7.1 Description of the Transmitter; 3.7.2 Specific Embodiments; 3.8 Other Techniques; 3.8.1 Shaped Offset QPSK; References; Chapter 4: Bandwidth-Efficient Modulations with More Envelope Fluctuation; 4.1 Bandwidth-Efficient TCM with Prescribed Decoding Delay-Equal Signal Energies; 4.1.1 ISI-Based Transmitter Implementation; 4.1.2 Evaluation of the Power Spectral Density…”
    Libro electrónico
  10. 370
    Publicado 2022
    Tabla de Contenidos: “…A Medley of Imports, Derivatives, Imitations, and Hybrids -- The Gods of the Others: Images of Foreign Deities in the Hellenistic Cult Place of Kharayeb -- Remarques sur le rôle du sel dans les pratiques votives de Kition : un exemple d’interaction entre les figurines divines et leur milieu -- On Gods and Caves: Comparing Cave-Sanctuaries in the Ancient Western Mediterranean -- Between Astarte, Isis and Aphrodite/Venus. Cultural Dynamics in the Coastal Cities of Sardinia in the Roman Age: The Case Study of Nora -- 2.3 Archaic and Classical Greece -- Déplacements, mobilité, communication. …”
    Libro electrónico
  11. 371
    Publicado 2023
    “…El conocimiento holístico de las estrategias audiovisuales que revela esta franquicia, proyecta una visión maniquea del mundo, modelando un ecosistema favorable al proyecto propagandístico de ISIS. Nuestro análisis advierte, en las creaciones de la productora, un proyecto intelectual que conjuga el estilo cinematográfico con la glorificación del terrorismo. …”
    Clic para texto completo. Acceso abierto.
    Tesis
  12. 372
    Libro
  13. 373
    por Bolland, Johannes, 1596-1665
    Publicado 1735
    991007966059706719
  14. 374
    Tabla de Contenidos: “…Sobre si los atenienses fueron más ilustres en guerra o en sabiduría ; VI. Isis y Osiris. Diálogos píticos ; VII. Si la virtud puede enseñarse. …”
    991006913829706719
  15. 375
    Publicado 2010
    Tabla de Contenidos: “…Commercial Hardware and TechniquesFiltration; Cream Whippers (a.k.a. "iSi Whippers"); "Cooking" with Cold: Liquid Nitrogen and Dry Ice; Cooking with (a Lot of) Heat; Appendix: Cooking Around Allergies; Afterword; Index…”
    Libro electrónico
  16. 376
    Publicado 2016
    Tabla de Contenidos: “…-- Nostalgia and Ostalgia -- Futurephobia and Daesh/ISIL/ISIS -- The real antidote to futurephobia - the long view -- 4: Meeting with the mentor -- Opening hearts and minds -- Reversing roles: mentor son, heroine mother -- Fool's errand? …”
    Libro electrónico
  17. 377
    Publicado 2017
    Tabla de Contenidos: “…. -- Instantiating the template -- Drawing the graph -- Extracting graphs from ISIS -- Getting started -- ISIS primer -- How to do it... -- How it works... -- Extracting graphs from OSPF -- Getting ready -- OSPF primer -- How to do it... -- How it works... -- Extracting graphs from MPLS VPNs -- Getting ready -- BGP MPLS VPN primer -- How to do it... -- How it works... -- There's more -- Chapter 7: Monitoring and Maintaining JUNOS -- Introduction -- Monitoring configuration changes network-wide -- Getting ready -- How to do it... -- SSH file transfer -- JUNOS OS event policy -- Web server application -- Web client application -- How it works... -- SSH File Transfer -- JUNOS OS event policy -- Web server application -- Web client application -- There's more -- Monitoring interface performance -- Getting ready -- Object-oriented primer for Node.js -- How to do it... -- Server application -- Web client application -- Setting up and Running -- How it works... -- Server application -- Web client application -- There's more -- Monitoring system health -- Getting ready -- How to do it... -- Server application -- Web client application -- How it works... -- Server application -- Client application -- Running the application -- There's more -- Monitoring MPLS LDP statistics -- Getting ready -- How to do it... -- Server application -- Web client application -- How it works... -- Server application -- Web client application -- Chapter 8: Security Applications -- Introduction…”
    Libro electrónico
  18. 378
    por Cypher, James
    Publicado 2012
    Tabla de Contenidos: “…Una explicación breve; Derrumbe de la industrialización por sustitución de importaciones; El sector automotriz; Éxito potencial en bienes de capital; Nafinsa: los últimos esfuerzos por reorientar la ISI; Surgimiento de los técnicos neoclásicos y la ideología neoliberal…”
    Libro electrónico
  19. 379
    Publicado 1980
    Tabla de Contenidos: “…Dillon -- Hairesis and heresy: the case of the haireseis iatrikai / Heinrich von Staden -- Sarapis and Isis / Tran tam Tinh -- Self-definition and the Asclepius cult / Howard C. …”
    Libro
  20. 380
    Publicado 1980
    Tabla de Contenidos: “…Dillon -- Hairesis and heresy: the case of the haireseis iatrikai / Heinrich von Staden -- Sarapis and Isis / Tran tam Tinh -- Self-definition and the Asclepius cult / Howard C. …”
    991007634879706719