Mostrando 2,641 - 2,660 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.47s Limitar resultados
  1. 2641
    Publicado 2022
    Tabla de Contenidos: “…The business of licensing -- Ownership and assignment of intellectual property -- The nature of an intellectual property license -- Implied licenses and unwritten transactions -- Confidentiality and pre-license negotiations -- License grant and scope -- Exclusive licenses -- Financial terms -- Development, allocation, and management of IP -- Representations, warranties, and indemnification -- Litigation-related clauses : enforcement, settlement, and dispute resolution -- Term, termination, and breach -- Other licensing terms: the "Boilerplate" -- Academic technology transfer -- Trademark and franchise licensing -- Music licensing -- Consumer and online licensing -- Software, data, and the cloud -- Public licenses : open source, creative commons and IP pledges -- Technical standards : fair, reasonable, and non-discriminatory (frand) licensing -- Bankruptcy and insolvency issues -- Estoppel and no challenge clauses -- First sale and exhaustion -- Intellectual property misuse -- Antitrust and competition issues -- Intellectual property pools and aggregation…”
    Libro electrónico
  2. 2642
    Publicado 2003
    Tabla de Contenidos: “…Practical reason and identity / Bruce Haddock -- Liberalism and multiculturalism : once more unto the breach / John Horton -- What is so different about difference? …”
    Libro
  3. 2643
    por Barry, John, 1933-2011
    Publicado 1997
    Tabla de Contenidos: “…Adagio / Mozart (John Cushing, clarinet) -- Karen's journey starts -- Karen's journey ends -- Karen's return from border -- Karen builds a school -- Harvest -- Safari -- Flight over Africa -- Beach at night -- You'll keep me then -- If I knew a song of Africa -- You are Karen M'Sabu -- Out of Africa (end credits)…”
    Disco musical
  4. 2644
    por Fenton, George
    Publicado 1987
    Tabla de Contenidos: “…Crossroads, a dawn raid (2:16) -- Gumboots (1:46) -- Black township (2:32) -- Shebeen Queen (2:58) -- Asking for trouble (2:23) --Dangerous country (1:38) -- Detention (2:00) -- The mortuary (2:27) -- The funeral (September 25, 1987) (4:40) -- At the beach (3:25) -- The getaway (3:23) -- The frontier (2:59) -- Last thoughts (1:35) -- Deadline (2:15) -- The phone call (2:01) -- Telle bridge (2:47) -- Soweto and vocal reprise (1:08) --Cry freedom (4:41)…”
    Disco musical
  5. 2645
    por Rosen, Rami. author
    Publicado 2014
    Tabla de Contenidos: “…; ""Code 2: ICMP_PROT_UNREACH (Protocol Unreachable)""; ""Code 3: ICMP_PORT_UNREACH (“Port Unreachableâ€?)""…”
    Libro electrónico
  6. 2646
    Publicado 1989
    Revista digital
  7. 2647
    Publicado 1996
    Revista digital
  8. 2648
    por Glass, Philip
    Publicado 2017
    Tabla de Contenidos: “…Cubierta -- Portada -- Imagen -- Dedicatoria -- Prólogo -- PRIMERA PARTE -- Baltimore -- Chicago -- Juilliard -- París -- Ravi Shankar -- Nadia Boulanger -- Viaje al Oriente -- Rishikesh, Katmandú y Darjeeling -- El bendito doctor del Valle de Tomo -- Kathakali y Satyagraha -- Cuatro caminos -- SEGUNDA PARTE -- Regreso a Nueva York -- Primeros conciertos -- Arte y música -- Cape Breton -- El East Village de Nueva York -- Einstein on the Beach -- TERCERA PARTE -- Ópera -- Música y cine -- Candy Jernigan -- La trilogía de Cocteau -- Epílogo -- Pliego de fotos -- Sumario -- Créditos -- Colofón…”
    Libro electrónico
  9. 2649
    por Blumenberg, Hans, 1920-1996
    Publicado 1983
    Libro
  10. 2650
    por Wessels, Johannes
    Publicado 1996
    Libro
  11. 2651
  12. 2652
    Publicado 2022
    “…Said Al-Wahid hat seinen Reisepass überall dabei, auch wenn er in Berlin-Neukölln nur in den Supermarkt geht. …”
    Libro
  13. 2653
    Publicado 2017
    Libro
  14. 2654
    por Shinder, Thomas W.
    Publicado 2007
    Tabla de Contenidos: “…The Paper ChaseRemovable Storage Risks; Physical Security Summary; Preventing Accidental Compromise of Data; Know Your Users; Educate Your Users; Control Your Users; Preventing Intentional Internal Security Breaches; Hiring and Human Resource Policies; Detecting Internal Breaches; Preventing Intentional Internal Breaches; Preventing Unauthorized External Intrusions; External Intruders with Internal Access; Tactical Planning; Recognizing Network Security Threats; Understanding Intruder Motivations; Recreational Hackers; Profit-motivated Hackers; Vengeful Hackers; Hybrid Hackers…”
    Libro electrónico
  15. 2655
    Publicado 2017
    Tabla de Contenidos: “…Conté: Dualitats urbanes = Urban dualities / Pere Joan Ravetllat -- Construir buidant = Building by emptying / Jordi Badia -- La forma de la ciutat = The shape of the city / Piet Eckert -- Reflexions sobre la casa i la ciutat = Reflections on the house and the city / Jonathan Sergison -- Entre tramas = Between fabrics / Josep Ferrando, Marta Peris -- Ciutat sense límits = City without limits / Matija Bevk -- Els espais de la ciutat = City spaces / Antoni Ubach -- La ciutat no és un arbre = The city is not a tree / Josep Lluís Mateo -- En el límite = On the limit / Josep Lluís Mateo…”
    Libro
  16. 2656
    por Crone, Tom
    Publicado 2002
    Tabla de Contenidos:
    Libro electrónico
  17. 2657
    por Storch, Anne
    Publicado 2021
    Tabla de Contenidos: “…The Philosophy of Hakuna Matata -- It Is Not Easy to Leave the Beach -- The Genesis of Hakuna Matata as a Philosophy -- Hakuna Matata Permeates Everything -- Into the Hakuna Matata Void -- Moving Out of the Hakuna Matata World -- Worms Moving In -- 4. …”
    Libro electrónico
  18. 2658
    Publicado 1997
    Revista digital
  19. 2659
    Publicado 2022
    “…"As the book clearly explains, there are situations in which questions of contract law need to be examined by investment tribunals - mainly as preliminary or incidental questions, to determine issues such as contract liability or breach of contract, that in turn are assumed as a basis for the issues of investment law in dispute"--…”
    Libro electrónico
  20. 2660
    Publicado 2023
    “…Most organizations put more resources toward identification, protection, and detection rather than their ability to respond to and recover from a cyber breach, leaving themselves vulnerable. But because companies can't protect against every new cyberattack, it's critical that they reduce the potential impact by putting more focus on cyber resilience. …”
    Libro electrónico