Showing 1 - 20 results of 8,381 for search '"privateer"', query time: 0.92s Refine Results
  1. 1
    by Tshweu, Podile Samuel
    Published 2015
    Subjects: ...Privatization...
    Get full text
    Others
  2. 2
    by Tshweu, Podile Samuel
    Published 2015
    Subjects: ...Privatization...
    Get full text
    Get full text
    Others
  3. 3
  4. 4
  5. 5
  6. 6
    by Schuknecht, Christine
    Published 2021
    ...In Private Broadcasting, a single plaintext is broadcast to multiple recipients in an encrypted...
    Get full text
    Get full text
    Others
  7. 7
    by Dunn, Alan Mark
    Published 2014
    ... the creation of new leak opportunities by ever-increasing software complexity, leaks of private data...
    Get full text
    Others
  8. 8
    by Fowkes, David Charles
    Published 2006
    Subjects: ...private military company...
    Get full text
    Others
  9. 9
    by Seedat, Bibi Ayesha
    Published 2008
    ... sections and perineal tears. The research was carried out at a private obstetric unit in Gauteng from...
    Get full text
    Others
  10. 10
  11. 11
    by Dickinson, Paul
    Published 2007
    ...This thesis includes a survey of the results known for private and approximate private quantum...
    Get full text
    Others
  12. 12
    by Olumofin, Femi George
    Published 2011
    Subjects: ...private information retrieval...
    Get full text
  13. 13
    by Olumofin, Femi George
    Published 2011
    Subjects: ...private information retrieval...
    Get full text
  14. 14
    by Chivi, Maya
    Published 2010
    ...This thesis examines the legal and ethical obligations of Quebec private daycare owners...
    Get full text
    Others
  15. 15
    by Narayanan, Hemalatha
    Published 2007
    ...Private corporate...
    Get full text
    Others
  16. 16
  17. 17
    by Dickinson, Paul
    Published 2007
    ...This thesis includes a survey of the results known for private and approximate private quantum...
    Get full text
    Others
  18. 18
    by Harris, B. A.
    Published 2013
    ...; and the application of Virtual Private Network (VPN) technology to protect traffic over untrusted networks...
    Get full text
  19. 19
    by Harris, B. A.
    Published 2014
    ...; and the application of Virtual Private Network (VPN) technology to protect traffic over untrusted networks...
    Get full text
  20. 20
    by Coleman, Anita Sundaram
    Published 1996
    ...-learning model from what it was in the traditional classroom-based model. "Teaching is no longer a private...
    Get full text