Trojan

Results: 685



#Item
21

Europeana: The Digital Humanities as a Trojan Horse 17 October 13 Leuven 5 million

Add to Reading List

Source URL: www.libisplus.be

- Date: 2014-02-05 05:51:36
    22The Trojan Women / Women and death

    NEW VOICES IN CLASSICAL RECEPTION STUDIES IssueS T AGI N G V I OLE N C E IN

    Add to Reading List

    Source URL: www2.open.ac.uk

    Language: English - Date: 2010-07-02 06:56:59
    23England / Education in England / Education / Department for Education / Government of England / Ofsted / Education reform / Operation Trojan Horse / Linda Darling-Hammond

    Owning what is ours: a manifesto for education July 2014 Owning what is ours Every parent wants the chance to send their child to a good school. Every teacher

    Add to Reading List

    Source URL: www.naht.org.uk

    Language: English - Date: 2014-07-18 07:28:19
    24Tickets / Tax reform / Value-added tax / Ticket / Fee / Law / Microeconomics / Ticket resale

    Terms and Conditions Everything you need to know about your THU 2016 ticket This document sets out the terms and conditions between Trojan Horse was Unicorn and you when you purchase a ticket or register for any activit

    Add to Reading List

    Source URL: trojan-unicorn.com

    Language: English - Date: 2016-08-22 10:00:58
    25Theatre / Greek mythology / Academia / Hecuba / Euripides / Satyr play / Douglass Parker / Marianne McDonald / Barrie Kosky / Greek Theatre of Syracuse / Didaskalia / The Trojan Women

    PDF Document

    Add to Reading List

    Source URL: www.didaskalia.net

    Language: English - Date: 2014-09-04 07:35:42
    26Trojan / Chu

    Statewide Technology Procurement Division-Staff Directory

    Add to Reading List

    Source URL: cio.ca.gov

    Language: English - Date: 2016-08-05 19:06:47
    27Malware / Cyberwarfare / Trojan horses / Computing / Computer network security / Botnets / Rootkits / Zeus / SpyEye / Cybercrime / Computer security

    FROM RUSSIA TO HOLLYWOOD: TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2012-01-26 20:15:24
    28Greek mythology / 1st millennium BC / Ancient Greece / Euripides / Aeschylus / The Trojan Women / Andromache / Hippolytus / Rape culture

    Nancy Sorkin Rabinowitz : Greek Tragedy: A Rape Culture? This essay looks at rape in Greek tragedy through the lens of several moments of feminist theorizing and activism about rape. Starting with a study of second and

    Add to Reading List

    Source URL: eugesta.recherche.univ-lille3.fr

    Language: English - Date: 2011-12-09 09:28:02
    29Ransomware / Malware / Cyberwarfare / Computer security / Cybercrime / Blackmail / Trojan horses / Computer virus / Antivirus software / PGPCoder / TeslaCrypt / CryptoLocker

    2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

    Add to Reading List

    Source URL: www.cise.ufl.edu

    Language: English
    30Trojan / Chu

    Statewide Technology Procurement Division-Staff Directory

    Add to Reading List

    Source URL: www.cio.ca.gov

    Language: English - Date: 2016-08-05 19:06:47
    UPDATE