Suggested Topics within your search.
Suggested Topics within your search.
History
22
Security measures
12
Mathematics
11
Computer networks
10
HISTORY
10
Wildfires
10
Fires
9
Korean War, 1950-1953
9
Natural disasters
9
General
8
Campaigns
6
Computer security
6
Military campaigns
6
Diplomatic relations
5
Foreign relations
5
Histoire
5
Military
5
Study and teaching (Elementary)
5
Computer science
4
National security
4
Relations extérieures
4
Armed Forces
3
Computer Science
3
Corporate governance
3
Defenses
3
Défense nationale
3
Korean War
3
Military readiness
3
POLITICAL SCIENCE
3
Philosophy
3
-
101
-
102by Caldwell, John Dean, 1940-Table of Contents: “…Battle of Britain: winning by not losing -- Battle of the Atlantic: protecting the maritime lifeline -- Invasion of Russia: Hitler's strategic mistake -- Battle of El Alamein and operation torch: cracking German invincibility -- Battles of Midway and Guadalcanal: regaining initiative in the Pacific -- Strategic bombing offensive: breaking German airpower -- Invasion of Italy: deciding to fight somewhere in Europe in 1943 -- D-Day and Battle for Normandy: retaking the Continent -- Battle for the Rhine: attacking Germany's vitals -- Battle of Okinawa and the bombing of Japan: ending the war -- The strategic architectures of World War II -- Battle of the Pusan perimeter: getting the most out of a bad situation -- Inchon: Operation Chromite: MacArthur's masterstroke -- Crossing the 38th parallel and driving north to the Yalu: the risks of overreaching -- Operations Ripper and Killer: recovery and frustration -- The strategic architectures of the Korean War -- Battle of Ia Drang Valley: not fighting the decisive battle -- Bombing campaign and high-tech initiatives: Operations Rolling Thunder and Igloo White: airpower and technology indecisive -- The Pacification program (1967-1968): failing to change behavior -- The Tet Offensive (1968): strategic disaster -- Vietnamization: never a winning strategy -- The final years (1969-1975): the losing path -- The strategic architectures of the VIetnam War -- Iraqi War I, Persian Gulf War: defeating Saddam, losing politically -- Iraqi War II, 13-year air conflict: the limits of airpower -- Iraqi War III, invasion of Iraq: winning without an endgame -- Iraqi War IV, the insurgency and the surge (2007-2008): relearning counterinsurgency -- Iraqi War V, the rise of ISIS: a new, more violent enemy -- The strategic architectures of the Iraqi Wars.…”
Published 2019
Book -
103by Bamberger, Honi JoyceTable of Contents: “…Reading an analog clock -- Determining the value of coins -- Units versus numbers -- Distinguishing between area and perimeter -- Overgeneralizing base-ten renaming -- 5. …”
Published 2010
Book -
104by Peake, JakTable of Contents: “…Peeping Through the Partition (1927-1936)Modernist Visions, Porous Barrack-Yard Boundaries; Privacy, Private Property and Rent; The Gynocentric Yard; Dangerous Transgressions; Resisting Patriarchy and Colonialism ; Dark Thresholds in the Colonial House (1934); Setting Boundaries, Crossing Borders ; Policing the Perimeter ; Playing House in the Community; Challenge from the South (1935-1945); Oil, Possession, Labour and the Yankee Dollar; Oil; Possession; Labour; The Yankee Dollar ; The Sub-Urban Expansion (1940s-1950s); Views of the Port, City and Country.…”
Published 2017
Connect to this title online (unlimited users allowed)
Electronic eBook -
105
-
106
-
107Published 2015Table of Contents: “…MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data.…”
Connect to this title online
Electronic eBook -
108
-
109
-
110Published 2007Table of Contents: “…Walls -- Third quarter : shooting from the perimeter -- The dao of hoops / Dirk Dunbar -- Hoop dreams, blacktop realities : basketball's role in the social construction of black manhood / Bernard Jackson Jr. -- She got game : basketball and the perfectly developed woman / Deborah A. …”
Connect to this title online (unlimited users allowed)
Electronic eBook -
111by Bowers, William T.Table of Contents: “…War Comes to Korea: The First Six Months; South Korea and American Policy; The United States Responds; First Battle; The Retreat Continues; The Pusan Perimeter; Inch'on and the Collapse of North Korea; The Chinese Attack; The New War; 2. …”
Published 2015
Connect to this title online (unlimited users allowed)
Electronic eBook -
112by Grapard, Allan G.Table of Contents: “…Geotyped and Chronotyped Social Spaces -- Hachiman's traveling icons -- Mount Hiko: of swords, meteors, dragons, and goshawks -- Waiting for dawn on Mount Hiko: the geotype and chronotype of heterotopia -- Mount Hiko's Sacred Perimeter: four corners and three dimensions -- Altitude and altered states of mind: creating a Dojo -- Mandala templates: divine planning -- Geotyped and chronotyped, encoded, mandalized bodies -- The visionary imperative3. …”
Published 2016
Connect to this title online
Electronic eBook -
113Published 2017Table of Contents: “…1 Rate of convergence for eigenfunctions of Aharonov-Bohm operators with a moving pole -- 2 Nondecreasing solutions to doubly nonlinear equations -- 3 Identification problems for degenerate integro-differential equations -- 4 A phase transition model describing auxetic materials -- 5 Global well-posedness for a phase transition model with irreversible evolution and acceleration forces -- 6 Perimeter symmetrization of some dynamic and stationary equations involving the Monge-Ampere operator -- 7 Optimal boundary control of a nonstandard Cahn–Hilliard system with dynamic boundary condition and double obstacle inclusions -- 8 Nontrivial solutions of quasilinear elliptic equatons with natural growth term -- 9 On a diffuse interface model for tumour growth with non-local interactions and degenerate mobilities -- 10 A boundary control problem for the equation and dynamic boundary condition of Cahn–Hilliard type -- 11 New class of doubly nonlinear evolution equations governed by time-dependent subdifferentials -- 12 Boundedness of solutions to a degenerate diffusion equation -- 13 Optimal a priori error estimates of parabolic optimal control problems with a moving point control -- 14 A note on the feedback stabilization of a Cahn–Hilliard type system with a singular logarithmic potential -- 15 Mathematical analysis of a parabolic-elliptic model for brain lactate kinetics -- 16 Weak formulation for singular diffusion equation with dynamic boundary condition -- 17 Smooth and broken minimizers of some free discontinuity problems -- 18 Stability results for abstract evolution equations with intermittent time-delay feedback -- 19 From visco-energetic to energetic and balanced viscosity solutions of rate-independent systems -- 20 A duality approach in some boundary value problems -- 21 On the structural properties of nonlinear flows.…”
Connect to this title online
Electronic eBook -
114
-
115Published 2018Table of Contents: “….; Figure 13 The wagon on which the statue of Shiva is carried around the perimeter of the temple; Madurai, Tamil Nadu.; Chapter 2; Figure 1 Triciput of the Ages of Man, Inv. no. 73/1, Bavarian National Museum, Munich.; Chapter 3…”
Connect to this title online (unlimited users allowed)
Electronic eBook -
116by Tyers, BenTable of Contents: “…1 Maths Bar Graph -- 2 Clickable & Moveable Object -- 3 Room Fade In & Out Transition -- 4 Typewriter Text Effect -- 5 Audio Volume Change Based On Distance -- 6 Move Object To Position Using Path 11 -- 7 Make The Screen Shake 13- 8 Create Snow Effect -- 9 Password Easter Egg -- 10 Follow Two Objects In View -- 11 High / Low Number Game -- 12 Calculate Average Position Of Two Clicks -- 13 Retrieve Text File Web From & Save Locally -- 14 Shuffle Pack Of Playing Cards & Deal -- 15 Reverse Sentence Order -- 16 Rotate & Move Object To Mouse Position -- 17 Firework Display Using Effects -- 18 Random Sentence Generator -- 19 Pop Up RPG Style Text Box -- 20 Room Wrapping -- 21 Sprite Shadow -- 22 Make A Jukebox Player For 4 Songs -- 23 Scrolling Credits -- 24 Random Dice Roller -- 25 Substitution Cipher -- 26 Save Highscore To INI -- 27 Spawn Point -- 28 Dictionary Check -- 29 Draw Text With Shadow -- 30 Classic Brick & Ball Game Remake -- 31 Fire Projectile -- 32 World Clock -- 33 Text Based Quiz -- 34 On Screen Keyboard -- 35 Create A Driveable Tank That Leaves Tyre Tracks -- 36 Parallax Background -- 37 Click The Ghost -- 38 Particle Fire Effect -- 39 Bubble Sort -- 40 Unlockable Levels Select Screen -- 41 Moon Lander AI -- 42 Dodge The Barrels -- 43 Convert Celsius To Fahrenheit -- 44 Find Path To Position Avoiding Objects -- 45 Calculate BMI -- 46 Shuffle Pack Of Playing Cards & Save To Text -- 47 10 Green Bottles -- 48 English To Morse Code -- 49 Blitz Game Remake -- 50 Mini Golf Game Remake -- 51 Rock, Paper, Scissors Game Remake -- 52 Health Based On Distance -- 53 Tank Trax Game Remake -- 54 Two Separate Views -- 55 Word Typing Game -- 56 Destructible Terrain -- 57 Duck Hunt Game Remake -- 58 Keep Player In View -- 59 Fizz Buzz -- 60 Calculate Numbers -- 61 Particle Trail Effect -- 62 Draw Rectangle and Calculate Area & Perimeter -- 63 Random Terrain Generation -- 64 Drop The Coin (arcade style) -- 65 Calculate the Nth Result Of Fibonacci Sequence -- 66 Distance From Object To Mouse -- 67 Convert Decimal To Binary, Oct, Hex & Roman -- 68 Text In X Box -- 69 Frogger Game Remake -- 70 Take a Screen Shot -- 71 Slowly Move Direction -- 72 Pong Style Game Remake -- 73 Shooting Gallery -- 74 How Many Of Each Letter -- 75 Torpedo Game Remake -- 76 One Hundred Random Numbers -- 77 Coin Flip -- 78 Predict Path Of An Object -- 79 Dynamic Button -- 80 Sokoban Game Remake -- 81 Top Down Football -- 82 Top Down Racing -- 83 Convert Numbers (in digits) To Words -- 84 Zelda Style Views -- 85 Convert Text File To eBook -- 86 Planets Database (INI) -- 87 How Much Flour -- 88 Rotating Mini Map -- 89 Selectable Troops -- 90 Pipes -- 91 Arcade Style Horse Race Game -- 92 Road Builder -- 93 Chess Board Representation -- 94 1942 Game Remake -- 95 Create A Virtual ATM (bank teller) -- 96 Moon Lander Game Remake -- 97 Pixelate An Image -- 98 Miner -- 99 Follow Player (Ghost) -- 100 Multiplication Table -- Appendix A: Points Chart.…”
Published 2017
Connect to this title online
Electronic eBook -
117by Mehan, Julie E.Table of Contents: “…; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both?…”
Published 2014
Connect to this title online (unlimited users allowed)
Electronic eBook -
118Published 2011Table of Contents: “…Why executive pay matters to innovation and inequality / William Lazonick -- 19. Products, perimeters and politics : systemic risk and securities regulation / Mary Condon -- 20. …”
Book -
119by Fisher, Peter F., 1955-Table of Contents: “…Plenary of Submitted Papers -- About Invalid, Valid and Clean Polygons -- 3D Geographic Visualization: The Marine GIS -- Local Knowledge Doesn’t Grow on Trees: Community-Integrated Geographic Information Systems and Rural Community Self-Definition -- Web GIS -- A Flexible Competitive Neural Network for Eliciting User’s Preferences in Web Urban Spaces -- Combining Heterogeneous Spatial Data From Distributed Sources -- Security for GIS N-tier Architecture -- Progressive Transmission of Vector Data Based on Changes Accumulation Model -- Elevation modelling -- An Efficient Natural Neighbour Interpolation Algorithm for Geoscientific Modelling -- Evaluating Methods for Interpolating Continuous Surfaces from Irregular Data: a Case Study -- Contour Smoothing Based on Weighted Smoothing Splines -- Flooding Triangulated Terrain -- Vagueness and Interpolation -- Vague Topological Predicates for Crisp Regions through Metric Refinements -- Fuzzy Modeling of Sparse Data -- Handling Spatial Data Uncertainty Using a Fuzzy Geostatistical Approach for Modelling Methane Emissions at the Island of Java -- Temporal -- A Visualization Environment for the Space-Time-Cube -- Finding REMO — Detecting Relative Motion Patterns in Geospatial Lifelines -- Indexing -- Spatial Hoarding: A Hoarding Strategy for Location-Dependent Systems -- Distributed Ranking Methods for Geographic Information Retrieval -- Representing Topological Relationships between Complex Regions by F-Histograms -- The Po-tree: a Real-time Spatiotemporal Data Indexing Structure -- Uncertainty -- Empirical Study on Location Indeterminacy of Localities -- Registration of Remote Sensing Image with Measurement Errors and Error Propagation -- Double Vagueness: Effect of Scale on the Modelling of Fuzzy Spatial Objects -- Area, Perimeter and Shape of Fuzzy Geographical Entities -- Generalisation -- Why and How Evaluating Generalised Data ? …”
Published 2005
Connect to this title online
Electronic eBook -
120by Marshall, AlistairTable of Contents: Connect to this title online (unlimited simultaneous users allowed)
Published 2021
Electronic eBook