Showing 101 - 120 results of 2,046 for search '((((torn OR toru) OR tor) OR ((torus OR (your OR you)) OR tors)) OR urn)', query time: 0.20s Refine Results
  1. 101
  2. 102
  3. 103

    How to Hold a Grudge : From Resentment to Contentment- the Power of Grudges to Transform Your Life / by Hannah, Sophie, 1971- author 649175

    Published 2019
    “…With this brilliant and hilarious guide, you will be able to grudge your way to your happiest, most optimistic, and most forgiving self."…”
    text
  4. 104
  5. 105
  6. 106

    Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization / by Sehgal, Kunal, author 656353, Thymianis, Nikolaos, author 656355, Packt Publishing (Online service) 656336

    Published 2023
    “…Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch. …”
    Get full text
    Get full text
    software, multimedia
  7. 107

    Mu (em-power-you) : a jewelry brand inspired by the stories of different communities by Cho, Cecilia Hyunjae

    Published 2021
    “…M^u (pronounced: em-power-you) is a handmade jewelry brand conceived to empower and transform. …”
    Get full text
    Final Year Project (FYP)
  8. 108
  9. 109
  10. 110
  11. 111
  12. 112

    Public perceptions on tree breeding solutions to Ash dieback (YouGov survey data) by Jepson, P, Arakelyan, I

    Published 2017
    “…The data was generated from a questionnaire survey adminstered by YouGov in March 2016. A second data set available on ORA relates to a similar survey of UK publics attending countryside events.…”
    Dataset
  13. 113

    Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization / by Rains, Tim, author 656361, Youngblood, Timothy, writer of foreword 656362, Packt Publishing (Online service) 656336

    Published 2023
    “…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
    Get full text
    Get full text
    software, multimedia
  14. 114
  15. 115
  16. 116
  17. 117
  18. 118
  19. 119

    Anatomy, Stretching & Training for Golfers : A Step-by-Step Guide to Getting the Most from Your Golf Workout / by Striano, Philip, Dr., author 575932

    Published 2014
    “…A handy guide lets you know the exercise's benefits and cautions, along with tips on perfecting your form. …”
    text
  20. 120

    Real-time personal protective equipment compliance detection using you only look once by Nurhanisah, Aminuddin, Nor Azuana, Ramli, Pratondo, Agus

    Published 2024
    “…The proposed research work employs the system of object detection from CCTV videos around the working sites of company XYZ through a framework that includes image acquisition, data collection, and video data pre-processing, with the implementation of various deep learning algorithms using state-of-the-art models such as You Only Look Once (YOLO) including YOLOv5, YOLOv7, and YOLOv8. …”
    Get full text
    Conference or Workshop Item