Trojan

Results: 685



#Item
21Europeana: The Digital Humanities as a Trojan Horse 17 October 13 Leuven 5 million

Europeana: The Digital Humanities as a Trojan Horse 17 October 13 Leuven 5 million

Add to Reading List

Source URL: www.libisplus.be

- Date: 2014-02-05 05:51:36
    22NEW VOICES IN CLASSICAL RECEPTION STUDIES IssueS T AGI N G V I OLE N C E  IN

    NEW VOICES IN CLASSICAL RECEPTION STUDIES IssueS T AGI N G V I OLE N C E IN

    Add to Reading List

    Source URL: www2.open.ac.uk

    Language: English - Date: 2010-07-02 06:56:59
    23Owning what is ours: a manifesto for education July 2014 Owning what is ours Every parent wants the chance to send their child to a good school. Every teacher

    Owning what is ours: a manifesto for education July 2014 Owning what is ours Every parent wants the chance to send their child to a good school. Every teacher

    Add to Reading List

    Source URL: www.naht.org.uk

    Language: English - Date: 2014-07-18 07:28:19
    24Terms and Conditions  Everything you need to know about your THU 2016 ticket This document sets out the terms and conditions between Trojan Horse was Unicorn and you when you purchase a ticket or register for any activit

    Terms and Conditions Everything you need to know about your THU 2016 ticket This document sets out the terms and conditions between Trojan Horse was Unicorn and you when you purchase a ticket or register for any activit

    Add to Reading List

    Source URL: trojan-unicorn.com

    Language: English - Date: 2016-08-22 10:00:58
    25

    PDF Document

    Add to Reading List

    Source URL: www.didaskalia.net

    Language: English - Date: 2014-09-04 07:35:42
    26Statewide Technology Procurement Division-Staff Directory

    Statewide Technology Procurement Division-Staff Directory

    Add to Reading List

    Source URL: cio.ca.gov

    Language: English - Date: 2016-08-05 19:06:47
    27FROM RUSSIA TO HOLLYWOOD:  TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

    FROM RUSSIA TO HOLLYWOOD: TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2012-01-26 20:15:24
    28Nancy Sorkin Rabinowitz : Greek Tragedy: A Rape Culture? This essay looks at rape in Greek tragedy through the lens of several moments of feminist theorizing and activism about rape. Starting with a study of second and

    Nancy Sorkin Rabinowitz : Greek Tragedy: A Rape Culture? This essay looks at rape in Greek tragedy through the lens of several moments of feminist theorizing and activism about rape. Starting with a study of second and

    Add to Reading List

    Source URL: eugesta.recherche.univ-lille3.fr

    Language: English - Date: 2011-12-09 09:28:02
    292016 IEEE 36th International Conference on Distributed Computing Systems  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

    2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

    Add to Reading List

    Source URL: www.cise.ufl.edu

    Language: English
    30Statewide Technology Procurement Division-Staff Directory

    Statewide Technology Procurement Division-Staff Directory

    Add to Reading List

    Source URL: www.cio.ca.gov

    Language: English - Date: 2016-08-05 19:06:47