1. The pietist theologians : an introduction to theology in the seventeenth and eighteenth centuries Publication/Creation: Malden, Massachusetts.: Blackwell Publishing, 2005 Resource Type: Book Access & Availability: Loading
2. Proceedings of SIGGRAPH `85: Twelfth Annual Conference Author/Creator: 12TH Annual Conference on Computer Graphics 1985 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 1985 Resource Type: Book Access & Availability: Loading
3. Proceedings of the 1st Acm Workshop on Network Data Anonymization Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
4. Proceedings of the 1st Acm Workshop on Virtual Machine Security Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
5. Proceedings of the 1st Acm Workshop on Workshop on Aisec Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
6. Proceedings of the 2008 Acm Workshop on Secure Web Services Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
7. Proceedings of the 2nd Acm Workshop on Computer Security Architectures Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
8. Proceedings of the 3rd Acm Workshop on Scalable Trusted Computing Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
9. Proceedings of the 4th Acm International Workshop on Storage Security and Survivability Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
10. Proceedings of the 4th Acm Workshop on Digital Identity Management Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
11. Proceedings of the 4th Acm Workshop on Quality of Protection Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
12. Proceedings of the 6th Acm Workshop on Formal Methods in Security Engineering Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
13. Proceedings of the 7th Acm Workshop on Privacy in the Electronic Society Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
14. Proceedings of the 8th Acm Workshop on Digital Rights Management Author/Creator: 15th ACM Conference on Computer and Communications Security 2008 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2008 Resource Type: Book Access & Availability: Loading
15. Proceedings of the 16th Acm Conference on Computer and Communications Security Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
16. Proceedings of the 1st Acm Workshop on Virtual Machine Security Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
17. Proceedings of the 2009 Acm Workshop on Cloud Computing Security Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
18. Proceedings of the 2009 Acm Workshop on Scalable Trusted Computing Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
19. Proceedings of the 2009 Acm Workshop on Secure Web Services Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
20. Proceedings of the 2nd Acm Workshop on Assurable and Usable Security Configuration Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
21. Proceedings of the 2nd Acm Workshop on Security and Artificial Intelligence Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
22. Proceedings of the 5th Acm Workshop on Digital Identity Management Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
23. Proceedings of the 8th Acm Workshop on Privacy in the Electronic Society Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
24. Proceedings of the First Acm Workshop on Information Security Governance Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
25. Proceedings of the First Acm Workshop on Secure Execution of Untrusted Code Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
26. Proceedings of the First Acm Workshop on Security and Privacy in Medical and Home-Care Systems Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
27. Proceedings of the Ninth Acm Workshop on Digital Rights Management Author/Creator: 16th ACM Conference on Computer and Communications Security 2009 Publication/Creation: [Place of publication not identified] Association for Computing Machinery 2009 Resource Type: Book Access & Availability: Loading
28. Proceedings of the 2010 ACM Workshop on Insider Threats Author/Creator: 17th ACM Conference on Computer and Communications Security 2010 Publication/Creation: [Place of publication not identified] ACM 2010 Resource Type: Book Access & Availability: Loading
29. Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security Author/Creator: 17th ACM Conference on Computer and Communications Security 2010 Publication/Creation: [Place of publication not identified] ACM 2010 Resource Type: Book Access & Availability: Loading
30. Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration Author/Creator: 17th ACM Conference on Computer and Communications Security 2010 Publication/Creation: [Place of publication not identified] ACM 2010 Resource Type: Book Access & Availability: Loading
31. Proceedings of the 6th ACM Workshop on Digital Identity Management Author/Creator: 17th ACM Conference on Computer and Communications Security 2010 Publication/Creation: [Place of publication not identified] ACM 2010 Resource Type: Book Access & Availability: Loading
32. Proceedings of the second annual Workshop on Security and Privacy in Medical and Home-Care Systems Author/Creator: 17th ACM Conference on Computer and Communications Security 2010 Publication/Creation: [Place of publication not identified] ACM 2010 Resource Type: Book Access & Availability: Loading
33. Proceedings of the tenth annual ACM Workshop on Digital Rights Management Author/Creator: 17th ACM Conference on Computer and Communications Security 2010 Publication/Creation: [Place of publication not identified] ACM 2010 Resource Type: Book Access & Availability: Loading
34. Playing Capoeira, or the Dance of War, from 'Picturesque Voyage to Brazil', 1835 (engraving) Author/Creator: (1802), Johann Moritz Rugendas, author Publication/Creation: New York, NY : Bridgeman Art Library, [20--?] Resource Type: Book Access & Availability: Loading
35. Paraphrase of Telegram from Governor Probyn to Secretary of State for the Colonies, re: War Office Recruits from Jamaica and 'Colour Question', June 22, 1915 Author/Creator: (1862), Sir Leslie Probyn, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
36. Panama Canal - Executive Office - Circular No. 600-47 re: Act of Congress - Amending Naturalization Laws, June 05, 1918 Author/Creator: (1866), Chester Harding, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
37. Panama Canal - Executive Office - Circular No. 603-12 re: Preference in Promotion, May 19, 1917 Author/Creator: (1866), Chester Harding, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
38. Press Release: "Stripping, Tarring, and Feathering of White Woman" by James Weldon Johnson, NAACP, July 18, 1921 Author/Creator: (1871), James Weldon Johnson, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
39. Paperwork re: DECREE NO. 15 on Provisional U.S. Use of Land on Island of Tabago, June 12, 1920 Author/Creator: (1876), Ernesto Tisdel Lefevre, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
40. Personal and Confidential Telegram from Governor Blackburne of Jamaica to Reginald Maudling re: Immigration Restrictions in Law Not Applied Since 1955 Author/Creator: (1907), Sir Kenneth Blackburne, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
41. Partial Report from Minister of State on West Indies Visit, undated Author/Creator: (1913), Iain Macleod, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
42. Personal and Confidential Telegram from Reginald Maudling to Governor Blackburne of Jamaica re: British Subjects and UK Citizens Entering & Working in Jamaica Without Restrictions Since 1955 Author/Creator: (1917), Reginald Maudling, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
43. Priority Telegram from Secretary of State for the Colonies Maudling to Governor Blackburne of Jamaica re: HM Speech on Commonwealth Immigration, October 31, 1961 Author/Creator: (1917), Reginald Maudling, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
44. Place of Traditional Music in African Society with Special Reference to Nigeria Author/Creator: (1918), Olaolu Omideyi, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
45. Paper prepared by Vella Pillay, re: South Africa: Aspects of Foreign Investment and Finance, 1974 Author/Creator: (1923), Vella Pillay, author Publication/Creation: [Place of publication not identified] : [publisher not identified], [20--?] Resource Type: Book Access & Availability: Loading
46. Proceedings of the 19th annual symposium on Simulation Author/Creator: 19th Annual Simulation Symposium 1986 Publication/Creation: IEEE Computer Society Press Resource Type: Book Access & Availability: Loading
47. Proceedings of the 20th Annual Symposium on Simulation Author/Creator: 19th Annual Simulation Symposium 1986 Publication/Creation: [Place of publication not identified] IEEE Computer Society Press 1987 Resource Type: Book Access & Availability: Loading
48. Proceedings of the 25th Annual Simulation Symposium Author/Creator: 19th Annual Simulation Symposium 1986 Publication/Creation: [Place of publication not identified] Society for Computer Simulation International 1988 Resource Type: Book Access & Availability: Loading
49. Pospopulares Las culturas populares después de la hibridación Author/Creator: Alabarces, Pablo Publication/Creation: Bielefeld Bielefeld University Press 2021 Resource Type: Book Edition: 1st ed. Access & Availability: Loading
50. Psychische Erkrankungen in der Arbeitswelt Analysen und Ansätze zur therapeutischen und betrieblichen Bewältigung Author/Creator: Alsdorf, Nora Publication/Creation: Bielefeld transcript Verlag 2017 Resource Type: Book Edition: 1st ed. Access & Availability: Loading