Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "predator"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"331 - Labor economics"
Search alternatives
:
"predator" »
"predictor"
Showing
1
-
7
of
7
Search:
'"predator"'
,
query time: 0.05s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
From difficult to disturbed : understanding and managing dysfunctional employees
by
Miller, Laurence
Published 2008
AMACOM
Table of Contents:
“
... employees -- Emoters and reactors: histrionic and borderline employees -- Preeners and
predators
...
”
Call Number:
HF5549.5.E42
Read Now
2
Is it safe? : protecting your computer, your business, and yourself online
by
Miller, Michael
Published 2008
Que
Table of Contents:
“
...
predators
-- Engaging in your own surveillance : tracking your children's online activity -- pt. VI...
”
Call Number:
QA76.9.A25
Read Now
3
Information spread in a social media age : modeling and control
by
Muhlmeyer, Michael
Published 2021
CRC Press
Table of Contents:
“
.... Example 1: A Spring-Mass System -- 6.11. Example 2: A
Predator
-Prey System -- 6.12. Example 3: An RLC...
”
Call Number:
HM742
Read Now
4
Social Network Analysis for Startups : Finding connections on the social web
by
Tsvetovat, Maksim
Published 2011
O'Reilly Media
“
... analysis (SNA) is a discipline that
predates
Facebook and Twitter by 30 years. Through expert SNA...
”
Call Number:
QA76.9.D343
Read Now
5
Managing the insider threat : no dark corners
by
Catrantzos, Nick
Published 2012
CRC Press
“
... these
predators
before they jeopardize the workplace and sabotage business operations...
”
Call Number:
HD61.5
Read Now
6
Practical embedded security : building secure resource-constrained systems
by
Stapko, Timothy John
Published 2008
Elsevier/Newnes
“
... whose
predations
have plagued traditional systems for years. Rising concerns about data security...
”
Call Number:
TK7895.E42
Read Now
7
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
by
Bachrach, Daniel G.
,
Rzeszut, Eric J.
Published 2014
Apress
Call Number:
QA76.9.A25
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 331 - Labor economics
Year of Publication
From:
To:
Classification
331 - Labor economics
005 - Computer programming, programs & data
3
658 - General management
3
006 - Special computer methods
2
302 - Social interaction
2
330 - Economics
1
more ...
338 - Production
1
384 - Communications; telecommunication
1
500 - Natural sciences & mathematics
1
see all ...
less ...
Language
English
7
Collection
O'Reilly
7
Author
Agarwal, Shaurya
1
Bachrach, Daniel G.
1
Catrantzos, Nick
1
Kouznetsov, Alexander
1
Miller, Laurence
1
Miller, Michael
1
more ...
Muhlmeyer, Michael
1
Rzeszut, Eric J.
1
Stapko, Timothy John
1
Tsvetovat, Maksim
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&lookfor=%22predator%22&type=AllFields
Send by Email
×
Loading...