The Used

Results: 46220



#Item
851DO YOU KNOW THE SYSTEM? Since its inception in 1968, the Rating System has been a widely used tool for parents in considering their children’s moviegoing choices. Since the 1970s, the MPAA has conducted nationwide surv

DO YOU KNOW THE SYSTEM? Since its inception in 1968, the Rating System has been a widely used tool for parents in considering their children’s moviegoing choices. Since the 1970s, the MPAA has conducted nationwide surv

Add to Reading List

Source URL: www.filmratings.com

- Date: 2017-05-08 12:33:56
    852NIST SP 800 – 53r4 APPENDIX J CONTROL ALLOCATIONS and IMPLEMENTATION STATEMENTS Control Types a. Common: Single implementation leveraged and used uniformly across the Department. b. Hybrid: Implementation is split betw

    NIST SP 800 – 53r4 APPENDIX J CONTROL ALLOCATIONS and IMPLEMENTATION STATEMENTS Control Types a. Common: Single implementation leveraged and used uniformly across the Department. b. Hybrid: Implementation is split betw

    Add to Reading List

    Source URL: cio.noaa.gov

    - Date: 2016-11-30 11:59:04
      853New Media CMS –Power and flexibility for the Internet The Internet has developed into a powerful and widely used tool for marketing and content delivery to an organisations internal and external audience.

      New Media CMS –Power and flexibility for the Internet The Internet has developed into a powerful and widely used tool for marketing and content delivery to an organisations internal and external audience.

      Add to Reading List

      Source URL: www.newmediadevelopment.net

      - Date: 2007-07-16 13:10:38
        854ACU-M Console TM Simple. Affordable. Mission Critical Interoperability.  The ACU-M can be used as an easy console for shopping

        ACU-M Console TM Simple. Affordable. Mission Critical Interoperability. The ACU-M can be used as an easy console for shopping

        Add to Reading List

        Source URL: jps.sugarmapleinteractive.com

        - Date: 2017-06-28 09:09:54
          855chapter 15.  This chapter deals with the treatment modalities used in the non-surgical management of cervical cancer. These include radiotherapy, chemotherapy, and various combinations of radiotherapy and

          chapter 15. This chapter deals with the treatment modalities used in the non-surgical management of cervical cancer. These include radiotherapy, chemotherapy, and various combinations of radiotherapy and

          Add to Reading List

          Source URL: publications.iarc.fr

          - Date: 2017-08-17 10:01:24
            856Introduction The Utah Citizen Monitoring program is a statewide program that has used volunteers to collect lake water quality data for the past nine years. Utah Lake Watch (ULW), which began in 2002, uses volunteers to

            Introduction The Utah Citizen Monitoring program is a statewide program that has used volunteers to collect lake water quality data for the past nine years. Utah Lake Watch (ULW), which began in 2002, uses volunteers to

            Add to Reading List

            Source URL: extension.usu.edu

            - Date: 2016-11-14 16:55:29
              857Comments on Longmire and Smith Rudy Severns N6LF 7 December 2016 The following is a summary of my comments on the Longmire and Smith[1] (L&S) technical report. This note is intended to be used in conjunction with a .pdf

              Comments on Longmire and Smith Rudy Severns N6LF 7 December 2016 The following is a summary of my comments on the Longmire and Smith[1] (L&S) technical report. This note is intended to be used in conjunction with a .pdf

              Add to Reading List

              Source URL: rudys.typepad.com

              - Date: 2017-01-11 14:12:54
                858GRI CONTENT INDEX 2015 GRI G4 guidelines were used as a reference. The below table includes those aspects that were found material. GRI

                GRI CONTENT INDEX 2015 GRI G4 guidelines were used as a reference. The below table includes those aspects that were found material. GRI

                Add to Reading List

                Source URL: www.webershandwick.com

                - Date: 2016-08-17 15:39:33
                  859A Protocol for High-Security Bitcoin Storage Version 0.9 Beta1 ​Beta Release Note:​ ​This protocol is complete, believed to be secure, and is being used today to secure real money.​ However, as this​ is the ini

                  A Protocol for High-Security Bitcoin Storage Version 0.9 Beta1 ​Beta Release Note:​ ​This protocol is complete, believed to be secure, and is being used today to secure real money.​ However, as this​ is the ini

                  Add to Reading List

                  Source URL: glacierprotocol.org

                  - Date: 2018-03-21 17:13:17
                    860On Designing and Deploying Internet-Scale Services James Hamilton – Windows Live Services Platform ABSTRACT The system-to-administrator ratio is commonly used as a rough metric to understand administrative costs in hig

                    On Designing and Deploying Internet-Scale Services James Hamilton – Windows Live Services Platform ABSTRACT The system-to-administrator ratio is commonly used as a rough metric to understand administrative costs in hig

                    Add to Reading List

                    Source URL: www.usenix.org

                    - Date: 2007-10-25 16:16:43