Search Results - "King

Refine Results
  1. 3021

    Art at Auction in 17th Century Amsterdam / by Montias, John Michael, 1928-2005

    Published 2002
    Table of Contents: “…-- Attributions -- Echoes -- Concluding Words on Auctions -- Profiles of Selected Buyers -- Art Dealers I: Artists and Merchants in the Trade -- Art Dealers II: Johannes de Renialme -- Art Dealers III: The Story of a Merchant Who Thought He Could Sell Paintings to a King -- Art Collectors and Painters I: Rubens's Promise to Hans Thijsz -- Art Collectors and Painters II: Jacob Swalmius and Rembrandt -- Art Collectors and Painters III: Marten van den Broeck and Rembrandt's Losses at Sea -- Art Collectors and Painters IV: Jan van Maerlen and His Extended Family -- Art Collectors and Painters V: Jean le Bleu, Francois Venant and Rembrandt's "Feast of Belshazzar" -- A Collector with Connections to Major Cultural Figures: Robbert van der Hoeve and the "Muiden Circle" -- What Santa Claus Brought to the Youth of Amsterdam -- When Sellers and Buyers Were Related: Elbert and Cornelis Symonsz. …”
    Full text available:
    Electronic eBook
  2. 3022

    Frontier Tibet : Patterns of Change in the Sino-Tibetan Borderlands /

    Published 2020
    Table of Contents: “…Tan -- Money, politics, and local identity : an inside look at the 'diary' of a twentieth-century Khampa trader / Lucia Galli -- The dispute between Sichuan and Xikang over the Tibetan kingdom of Trokyap (1930s-1940s) / Fabienne Jagou -- The rise of a political strongman in Derge in the early twentieth century : the story of Jagö Topden / Yudru Tsomu -- Harnessing the power of the Khampa elites : political persuasion and the consolidation of Communist Party rule in Gyelthang / Dáša Pejchar Mortensen -- Return of the good king : kingship and identity among Yushu Tibetans since 1951 / Maria Turek -- Yachen as process : encampments, nuns, and spatial politics in post-Mao Kham / Yasmin Cho -- Chinese settler colonialism : empire and life in the Tibetan borderlands / Carole McGranahan.…”
    Full text available:
    Electronic eBook
  3. 3023

    Defending the brand aggressive strategies for protecting your brand in the online arena / by Murray, Brian H., 1968-

    Published 2004
    Table of Contents: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 3024

    Custodial grandparenting individual, cultural, and ethnic diversity /

    Published 2006
    Table of Contents: “…Roberto -- Variability in the need for formal and informal social support among grandparent caregivers : a pilot study / Jennifer King, Bert Hayslip Jr., and Patricia L. Kaminiski -- Age, health, and custodial grandparenting / Bert Hayslip Jr., R. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 3025
  6. 3026

    Innovations in human resource management getting the public's work done in the 21st century /

    Published 2009
    Table of Contents: “…. -- Succeeding as a strategic HR partner : a practical approach / Tom Wimer -- Legislating innovation in human capital management : lessons from the Department of Homeland Security / Douglas A. Brook and Cynthia L. King -- The human capital "crisis" in the federal government : a modest proposal / Alan P. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 3027

    The harms of crime media essays on the perpetuation of racism, sexism and class stereotypes /

    Published 2012
    Table of Contents: “…Hepner -- Monstrous, demonic and evil: media constructs of women who kill / Kate Whiteley -- Gangs, politics and media: lessons from the New York chapter of the Almighty Latin King and Queen Nation / Louis Kontos -- Inequalities in CSI: Crime Scene Investigation: stereotypes in the CSI investigators / Denise L. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 3028

    A companion to Woody Allen

    Published 2013
    Table of Contents: “…Stephen Papson: Critical theory and the cinematic world of Woody Allen -- Gregg Bachman: Crimes and misdemeanors: reflections on reflexivity -- Claire Sisco King: Play it again, Woody: self-reflexive critique in contemporary Woody Allen films -- Christopher Ames: Hollywood endings: Woody Allen on Hollywood, filmmaking, and happy endings -- Allen and his sisters: cultural critiques. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 3029
  10. 3030

    The harms of crime media essays on the perpetuation of racism, sexism and class stereotypes /

    Published 2012
    Table of Contents: “…Hepner -- Monstrous, demonic and evil: media constructs of women who kill / Kate Whiteley -- Gangs, politics and media: lessons from the New York chapter of the Almighty Latin King and Queen Nation / Louis Kontos -- Inequalities in CSI: Crime Scene Investigation: stereotypes in the CSI investigators / Denise L. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 3031

    A companion to Woody Allen

    Published 2013
    Table of Contents: “…Stephen Papson: Critical theory and the cinematic world of Woody Allen -- Gregg Bachman: Crimes and misdemeanors: reflections on reflexivity -- Claire Sisco King: Play it again, Woody: self-reflexive critique in contemporary Woody Allen films -- Christopher Ames: Hollywood endings: Woody Allen on Hollywood, filmmaking, and happy endings -- Allen and his sisters: cultural critiques. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 3032
  13. 3033

    Applied Petrochemical Research

    Open Access
    Electronic Journal
  14. 3034

    Criminologists on terrorism and homeland security

    Published 2011
    Table of Contents: “…Federal and local coordination in homeland security Ed Maguire and William King; 15. Liberty and security in an era of terrorism John Kleinig; 16. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 3035

    Antibody-drug conjugates : fundamentals, drug development, and clinical outcomes to target cancer /

    Published 2017
    Table of Contents: “…Typical antibody-drug conjugates / John Lambert -- Selecting optimal ADC targets using indication-dependent or indication-independent approaches / Robert Hollingsworth and Jay Harper -- Antibody drug conjugates : an overview of the CMC and characterization process / Janet Wolfe and Phillip Ross -- Linker and conjugation technology and improvements / Riley Ennis and Sourav Sinha -- Formulation and stability / Kouhei Tsumoto, Anthony Young, and Satoshi Ohtake -- QC assay development / Xiao-Hong Chen and Mate Tolnay -- Occupational health and safety aspects of ADCs and their toxic payloads / Robert Sussman and John Farris -- Bioanalytical strategies enabling successful ADC translation / Xiaogang Han, Lindsay King, and Steve Hansel -- Nonclinical pharmacology and mechanistic modeling of antibody drug conjugates in support of human clinical trials / Brian J. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 3036

    Applied Petrochemical Research

    Open Access
    Electronic Journal
  17. 3037

    Defending the brand aggressive strategies for protecting your brand in the online arena / by Murray, Brian H., 1968-

    Published 2004
    Table of Contents: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 3038

    Custodial grandparenting individual, cultural, and ethnic diversity /

    Published 2006
    Table of Contents: “…Roberto -- Variability in the need for formal and informal social support among grandparent caregivers : a pilot study / Jennifer King, Bert Hayslip Jr., and Patricia L. Kaminiski -- Age, health, and custodial grandparenting / Bert Hayslip Jr., R. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 3039
  20. 3040

    Innovations in human resource management getting the public's work done in the 21st century /

    Published 2009
    Table of Contents: “…. -- Succeeding as a strategic HR partner : a practical approach / Tom Wimer -- Legislating innovation in human capital management : lessons from the Department of Homeland Security / Douglas A. Brook and Cynthia L. King -- The human capital "crisis" in the federal government : a modest proposal / Alan P. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook