Art, gender and religious devotion in grand ducal tuscany
By: Material type:
TextLanguage: English Series: Women and Gender in the Early Modern WorldPublication details: Farnham, England Ashgate Publishing Limited 2014Description: viii, 166pISBN: - 978-93-82835-09-7
- 704.04, SAN/RR
Reference
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reference
|
Department of Education Library | Department of Education Library | 704.04, SAN/RR (Browse shelf(Opens below)) | Not for loan | EL0088251 |
There are no comments on this title.
Log in to your account to post a comment.
-
301
History of cyber security attacks: 1980 to present
by Middleton Bruce -
302
Hybrid intrusion detection system
by Wang Yanxin -
303
Implementing the ISO/IEC 27001 information security management system standard
by Humphreys Edward -
304
Indentifying malicious code through reverse engineering
by Abhishek Singh Ed. -
305
Information assurance, security and privacy services
by Rao H Raghav Ed. -
306
Information assurance: dependability and security in networked systems
by Qian Yi -
307
Information hiding
by Katzenbeisser Stefan -
308
Information security
by Stamp Mark -
309
Information security architecture: An integrated approach to security in the organization
by Killmeyer Jan -
310
Information security fundamentals
by Peltier Thomas R -
311
Information security governance
by Von Solms S H -
312
Information security handbook
by Hunter John M. D. -
313
Information security handbook
by Hunter John M. D. -
314
Information security management handbook
by Tipton Harold F Ed. -
315
Information security management metrics:definitive guide to effective security monitoring and measurement
by Brotby W Krag -
316
Information security management: global challenges in the new millennium
by Dhillon Gurpreet -
317
Information security management:concepts and practice
by Raggad Bel G -
318
Information security policies and actions in modern integrated systems
by Fugini Mariagrazia -
319
Information security risk analysis
by Peltier Thomas R -
320
Information security risk analysis
by Peltier Thomas R -
321
Information security: Foundations, technologies and applications
by Awad Ali Ismail Ed. -
322
Information system security : security management, metrics, frameworks and best practices
by Godbole Nina -
323
Information system security : security management, metrics, frameworks and best practices
by Godbole Nina -
324
Information systems security
by Fisher Royal P -
325
Information systems security
by Fisher Royal P -
326
Information warfare: Corporate attack and defence in a digital world
by Hutchinson Bill -
327
Inside network perimeter security
by Northcutt Stephen -
328
Inside network perimeter security
by Northcutt Stephen -
329
Insider threats in cyber security
by Probst Christian W Ed. -
330
Integrated security scheme with resource-awareness for wireless Ad Hoc networks
by Deng Hongmei -
331
Integrating security and software engineering: Advances and future visions
by Mouratidis Haralambos -
332
Intelligence and security informatics:techniques and applications
by Chen Hsinchun Ed. -
333
Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security
by Leon Reznik -
334
Internet and Intranet security management: risk and solutions
by Janczewski Lech -
335
Internet besieged: countering cyberspace scofflaws
by Denning Dorothy E -
336
Internet of things
by Tsiatsis Vlasios -
337
Internet of things A to Z: Technologies and applications
by Hassan Qusay F Ed. -
338
Internet of things: Systems and applications
by Khan Jamil Y Ed. -
339
Internet security dictionary
by Phoha Vir V -
340
Introductin to data security and controls
by Buck Edward R -
341
Introduction to computer and network security : navigating shades of gray
by Brooks Richard R -
342
Introduction to computer security
by Bishop Matt -
343
Introduction to Computer Security
by Matt Bishop -
344
Introduction to cryptography : principles and applications
by Delfs Hans; Knebl Helmut -
345
Introduction to cryptography : Principles and applications
by Delfs Hans -
346
Introduction to cryptography : Principles and applications
by Delfs Hans -
347
Introduction to cryptography : Principles and applications
by Delfs Hans -
348
Introduction to machine learning with applications in information security
by Stamp Mark -
349
Introduction to network security
by Krawetz Neal -
350
Introduction to network security
by Krawetz Neal
Art, gender and religious devotion in grand ducal tuscany
APA
Sanger Alice E, . (2014). Art, gender and religious devotion in grand ducal tuscany. Farnham, England: Ashgate Publishing Limited.
Chicago
Sanger Alice E, . 2014. Art, gender and religious devotion in grand ducal tuscany. Farnham, England: Ashgate Publishing Limited.
Harvard
Sanger Alice E, . (2014). Art, gender and religious devotion in grand ducal tuscany. Farnham, England: Ashgate Publishing Limited.
MLA
Sanger Alice E, . Art, gender and religious devotion in grand ducal tuscany. Farnham, England: Ashgate Publishing Limited. 2014.
