Search alternatives:
brands group » bands groups, boards group, brands grow
branch group » branch groups, _ branchgroup, branchgroup _

1
by McNally, David
Published 2011
Berrett-Koehler Publishers
Table of Contents: ... different dimensions -- Designing your personal brand of making a difference -- Authenticity...

2
by MacInnis, Deborah J.
Published 2015
Emerald
Table of Contents: ...What does brand authenticity mean? Causes and consequences of consumer scrutiny towards a brand...

3
by Lam, Celia
Published 2022
Taylor & Francis
Subjects: ...advertising;authenticity;branding;bromances;Celebrity;celebrities;fandom;fan studies;film;Hollywood...

4
by Goodson, Scott
Published 2012
McGraw-Hill
Subjects: ...Branding (Marketing) / http://id.loc.gov/authorities/subjects/sh2007006470...

5
by Harper, Frédéric
Published 2015
Apress, Distributed to the Book trade worldwide by Springer Science and Business Media
Table of Contents: ... Branding First; Thinking about Yourself as a Brand; Personal Branding May Not Be for You; I Don't Have Time...

6
by Silverstein, Michael J., Bolden, Dylan, Jacobsen, Rune, Sajdeh, Rohan
Published 2016
McGraw-Hill Education
Table of Contents: ...Introduction : cultivate the apostles to become a beloved, iconic brand -- Chapter one : Don't ask...

7
by Boerner, Wolfgang-M., Brand, Hans, Cram, Leonard A., Gjessing, Dag T.
Published 1985
Springer Netherlands
Table of Contents: ... -- V.12 (OI.2) Synthesis & Detection of Electromagnetic Authenticity Features -- V.13 (SR.5...

8
by Johansson, Jesper M.
Published 2008
Microsoft Press
Table of Contents: ...Windows security fundamentals. Subjects, users, and other actors -- Authenticators...

9
by Vries, Henkjan de, Stjernlöf, Lovisa Stenbäcken
Published 2023
Packt Publishing Ltd.
Table of Contents: ... network zones -- Behavior detection -- Enrolling end users in MFA -- Resetting authenticators -- Securing...

10
by Schwaighofer, Verena
Published 2014
Springer Fachmedien Wiesbaden
Table of Contents: ...Image and Destination Brands -- The Image of the United Arab Emirates -- The traditional Arabian...

11
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... on the AES -- Cryptographic Protocols (II) -- Group Secret Handshakes Or Affiliation-Hiding Authenticated...

12
by Cornwell, T. Bettina, Katz, Helen E.
Published 2021
Routledge
..., and communication studies to redefine the influencer as a persona (related to a person, group of people...

13
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action...

14
by Gibson, Darril
Published 2010
Wiley
Table of Contents: ... -- Troubleshooting a VPN Client -- A Few Words about Teredo -- Understanding DirectAccess -- Using Branch...

15
by Worsley, John C.
Published 2002
O'Reilly
Table of Contents: ...Backing Up and Restoring Data10: User and Group Management; Managing Users; Managing Groups...

16
by Norman, Matthew
Published 2001
Springer London
Table of Contents: ... -- OnRequestEnd.cfm -- 14. Using Cookies to Track Users -- 15. Securing Web Pages -- User authentication -- 16...

17
by Eisenbach, Iris
Published 2011
Vieweg+Teubner Verlag
...This textbook is intended for students of materials science, of different branches of engineering...

18
Published 2016
Springer Nature Singapore
Table of Contents: ...: Pharmacological Authenticity -- 11. Assessment of Genetic Diversity in Indigenous Plants in North East India...

19
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...) Authenticated Key Establishment:From 2-Party to Group -- Encryption II -- Multi-authority Attribute Based...

20
by Chacon, Scott, Straub, Ben
Published 2014
Apress, Distributed to the Book trade worldwide by Spring Science+Business Media
Table of Contents: ...Pushing -- Tracking Branches -- Pulling -- Deleting Remote Branches -- Rebasing -- The Basic Rebase...