Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: (("secularity" OR "security") or "regularity")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"302 - Social interaction"
language:"English"
Search alternatives
:
"secularity" »
"peculiarity"
,
"secularism"
"regularity" »
"regularly"
Showing
1
-
6
of
6
Search:
'(("secularity" OR "security") or "regularity")'
,
query time: 0.22s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Healing the wounds : overcoming the trauma of layoffs and revitalizing downsized organizations
by
Noer, David M.
Published 2009
Jossey-Bass
Table of Contents:
“
... and the end of job
security
-- Learning from the past: the survivor syndrome across time -- Speaking...
”
Call Number:
HD58.85
Read Now
2
Mastering Zendesk : master the art of providing effective IT services to your customers by leveraging Zendesk
by
Jacob, Cedric F.
Published 2017
Packt Publishing
Table of Contents:
“
... -- Decimal -- Checkbox -- Date --
Regular
Expression -- Creating custom fields -- Custom user fields...
”
Call Number:
HF5415.5
Read Now
3
IBM Cognos 10 framework manager : a comprehensive, practical guide to using this essential tool for modeling your data for use with IBM Cognos Business Intelligence Reporting
by
Curran, Terry
Published 2013
Packt Pub.
Table of Contents:
“
... --
Regular
dimensions -- Creating a
regular
dimension -- Dimensions with multiple hierarchies -- Creating a...
”
Call Number:
HD38.7
Read Now
4
Mastering Microsoft Teams : end user guide to practical usage, collaboration, and governance
by
Hubbard, Melissa
,
Bailey, Matthew J.
Published 2018
Apress
Table of Contents:
“
...; Team Request Reviewed by Admin or Help Desk; Pros; Cons; Placing Teams Requestors ina
Security
Group...
”
Call Number:
HF5548.4.M5265
Read Now
5
Smashing WordPress : beyond the blog
by
Hedengren, Thord Daniel
Published 2011
Wiley
Table of Contents:
“
... to Make Your WordPress Install More
Secure
-- Users and Passwords -- Server-side
Security
Steps -- Looking...
”
Call Number:
TK5105.8885.W66
Read Now
6
The road to reinvention : how to drive disruption and accelerate transformation
by
Linkner, Josh
Published 2014
Jossey-Bass
“
..., and individuals make reinvention a
regular
part of their business strategies. Transformation demands an ongoing...
”
Call Number:
HD58.8
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 302 - Social interaction
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
302 - Social interaction
300 - Social sciences
5
330 - Economics
5
658 - General management
5
500 - Natural sciences & mathematics
3
670 - Manufacturing
3
more ...
006 - Special computer methods
1
338 - Production
1
380 - Commerce, communications & transportation
1
510 - Mathematics
1
745 - Decorative arts
1
see all ...
less ...
Language
English
Collection
O'Reilly
6
Author
Bailey, Matthew J.
1
Curran, Terry
1
Hedengren, Thord Daniel
1
Hubbard, Melissa
1
Jacob, Cedric F.
1
Linkner, Josh
1
more ...
Noer, David M.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22302+-+Social+interaction%22&filter%5B%5D=language%3A%22English%22&lookfor=%28%28%22secularity%22+OR+%22security%22%29+or+%22regularity%22%29&type=AllFields
Send by Email
×
Loading...