Search alternatives:
"secularity" » "peculiarity", "secularism"
"regularity" » "regularly"

1
by Cohen-Almagor, Raphael
Published 2022
Springer International Publishing
... as a challenge to its Republican secular raison d'être. It makes general arguments about France’s...

2
by Jansen, Yolande
Published 2013
Amsterdam University Press
Table of Contents: .... Elements of a critique of the laïcité-religion framework -- 7. Secularism, sociology and security -- 8...

3
by Forta, Ben
Published 2018
Addison-Wesley
Subjects: ...Regular expressions (Computer science) / http://id.loc.gov/authorities/subjects/sh2018002310...

4
by Braddon, Laurence
Published 1721
printed for, and sold by Tho. Warner, in Pater-Noster-Row, and Joseph Fox, in Westminster-Hall

5
by Braddon, Laurence
Published 1721
Printed for and sold by Tho. Warner ... and Joseph Fox
...Regular government and judicious employment of the poor, the most probable means of raising...

6
by Wickham, Peter
Published 1994
International Monetary Fund
Subjects: ...Investment & securities...

7
Published 2018
The World Bank
...The European Union (EU) Regular Economic Report (RER), is an annual publication of the World Bank...

8
by Muharremi, Robert, Ramadani, Alisa
Published 2024
Palgrave Macmillan
Table of Contents: ..., and the Kosovo Protection Corps -- 4. Kosovo’s Independence and the Kosovo Security Force -- 5. From Kosovo...

9
Published 2023
The World Bank
... and nutrition security. Most WB6 countries have recently included agriculture greening in their development...

10
Published 2018
The World Bank
... for more secure long-term growth. External imbalances have been high but mostly stable. The risks clouding...

11
by Amselem, Serge
Published 2007
Inserm, Institut national de la sante et de la recherche medicale (National Institute for Health and Medical Research)
... by the RSI [Regime social des independants (Social Security Scheme for the Self-Employed), formerly Canam...

12
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

13
Published 2020
Springer International Publishing
Table of Contents: ...DETIPS 2020: Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital...

14
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber...

15
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Security -- Building a Cryptovirus Using Microsoft’s Cryptographic API -- On the Security of the WinRAR...

16
by Gregory, Brad S.
Published 2012
Harvard University Press
... of the following five centuries. A hyperpluralism of religious and secular beliefs, an absence of any substantive...

17
by Lockhart, Andrew
Published 2006
O'Reilly
Subjects: ...Computer security...

18
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues...

19
by Verma, Piyush
Published 2015
Packt Publishing
Table of Contents: ... and regular expressions -- Regular expressions -- Nailing the CTF challenge -- Summary -- Chapter 4 : Probing...

20
Published 2016
Springer International Publishing
Table of Contents: ... Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution...