Academic literature on the topic 'Unauthorised aids'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorised aids.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Unauthorised aids"
Pal, Puspalata, and Dhirendra Kumar Sarangi. "Impact of Biomedical Waste on Cuttack City." Current World Environment 13, no. 2 (August 25, 2018): 259–69. http://dx.doi.org/10.12944/cwe.13.2.11.
Full textEdgar, Harold, and Hazel Sandomire. "Medical Privacy Issues in the Age of AIDS: Legislative Options." American Journal of Law & Medicine 16, no. 1-2 (1990): 155–222. http://dx.doi.org/10.1017/s0098858800009977.
Full textEnyindah, P., and Uzochukwu C. Onwuachu. "An Intrusion Detection System Application for an Organisation." Circulation in Computer Science 2, no. 3 (April 24, 2017): 23–28. http://dx.doi.org/10.22632/ccs-2017-251-87.
Full textZovko Končić, Marijana. "Getting More Than You Paid For: Unauthorized “Natural” Substances in Herbal Food Supplements on EU Market." Planta Medica 84, no. 06/07 (January 16, 2018): 394–406. http://dx.doi.org/10.1055/s-0044-100042.
Full textPatel, Maitri, and Rajan Patel. "Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem." Emerging Science Journal 5, no. 1 (February 1, 2021): 77–84. http://dx.doi.org/10.28991/esj-2021-01259.
Full textWesolowski, Michael D., Arnie H. Zencius, and Ileana M. Rodriguez. "Mini-breaks: the use of escape on a fixed-time schedule to reduce unauthorized breaks from vocational training sites for individuals with brain injury." Behavioral Interventions 14, no. 3 (July 1999): 163–70. http://dx.doi.org/10.1002/(sici)1099-078x(199907/09)14:3<163::aid-bin30>3.0.co;2-l.
Full textMeyer, Dirk. "Zur juristischen Begründung des ‚Rettungsschirms‘." Review of Economics 61, no. 2 (January 1, 2010). http://dx.doi.org/10.1515/roe-2010-0201.
Full textMeyer, Dirk. "Kosten des Europäischen Finanzstabilisierungsmechanismus (EFSM) aus deutscher Sicht / The Costs of the European Financial Stability Facility (EFSF) – The German Point of View." Jahrbücher für Nationalökonomie und Statistik 231, no. 2 (January 1, 2011). http://dx.doi.org/10.1515/jbnst-2011-0206.
Full textKolås, Åshild, and Lacin ldil Oztig. "From towers to walls: Trump’s border wall as entrepreneurial performance." Environment and Planning C: Politics and Space, March 24, 2021, 239965442110030. http://dx.doi.org/10.1177/23996544211003097.
Full text"Image Steganography embedded with Advance Encryption Standard (AES) securing with SHA-256." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 641–48. http://dx.doi.org/10.35940/ijitee.h6442.069820.
Full textDissertations / Theses on the topic "Unauthorised aids"
Edlander, Timmie. "Akademiskt fusk : En kvalitativ studie om hur studenter motiverar handlingar som har föranlett disciplinära åtgärder." Thesis, Karlstads universitet, Institutionen för sociala och psykologiska studier, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-57027.
Full textBooks on the topic "Unauthorised aids"
An underground education: The unauthorized and outrageous supplement to everything you thought you knew about art, sex, business, crime, science, medicine, and other fields of human knowledge. New York: Doubleday, 1997.
Find full textFiscal year 1997 unauthorized transit projects: Hearing before the Subcommittee on Surface Transportation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Fourth Congress, second session, April 25, 1996. Washington: U.S. G.P.O., 1997.
Find full textOffice, General Accounting. Foreign aid: Potential for diversion of economic support funds to unauthorized use : report to the Chairman, Subcommittee on Europe and the Middle East, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1987.
Find full textOffice, General Accounting. Foreign aid: Potential for diversion of economic support funds to unauthorized use : report to the Chairman, Subcommittee on Europe and the Middle East, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1987.
Find full textOffice, General Accounting. Foreign aid: Potential for diversion of economic support funds to unauthorized use : report to the Chairman, Subcommittee on Europe and the Middle East, Committee on Foreign Affairs, House of Representatives. Washington, D.C: The Office, 1987.
Find full textLibrary of Congress. Congressional Research Service, ed. The potential liability of insurance comapanies and self-insured businesses for unauthorized disclosure of medical information provided in connection with AIDS related insurance claims. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1988.
Find full textAn Underground Education : The Unauthorized and Outrageous Supplement to Everything You Thought You Knew About Art, Sex, Business, Crime, Science, Medicine, and Other Fields of Human. Anchor, 1999.
Find full textManekin, Devorah S. Regular Soldiers, Irregular War. Cornell University Press, 2020. http://dx.doi.org/10.7591/cornell/9781501750434.001.0001.
Full textBook chapters on the topic "Unauthorised aids"
Castañeda, Heide. "Medical aid as protest: acts of citizenship for unauthorized im/migrants and refugees." In Protesting Citizenship: Migrant Activisms, 85–98. Routledge, 2017. http://dx.doi.org/10.4324/9781315089393-7.
Full textYoshikawa, Hirokazu, Alice J. Wuermli, and J. Lawrence Aber. "Mitigating the Impact of Forced Displacement and Refugee and Unauthorized Status on Youth." In Humanitarianism and Mass Migration, 186–206. University of California Press, 2018. http://dx.doi.org/10.1525/california/9780520297128.003.0009.
Full textMartin, Philip. "US Farm Labor." In The Prosperity Paradox, 29–66. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198867845.003.0004.
Full textCabrera, Luis. "Free Movement, Sovereignty and Cosmopolitan State Responsibility." In The State and Cosmopolitan Responsibilities, 224–42. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198800613.003.0012.
Full textBhatt, Chintan M., Kevin R. Patel, Yashvi Nileshbhai Raythatha, Poojan S. Dharaiya, Chirag Jethva, Karan Mehul Kathiriya, Vidhya Piyushbhai Kothadia, Deep Kothadiya, Vaishali Mewada, and Mayuri Jamanadas Popat. "Video-Based Human Authentication System for Access Control." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 181–202. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5101-1.ch009.
Full textDadmarz, Hamed H. "Identification of Information Security Management Factors." In Advances in Electronic Government, Digital Divide, and Regional Development, 160–74. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7086-8.ch009.
Full textShaqrah, Amin A., and Talal Noor. "A Conceptual Framework for an Extension Access Control Models in Saudi Arabia Healthcare Systems." In Data Analytics in Medicine, 182–93. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1204-3.ch010.
Full textMazid, Mohammed M., A. B. M. Shawkat Ali, and Kevin S. Tickle. "Intrusion Detection Using Machine Learning." In Dynamic and Advanced Data Mining for Progressing Technological Development, 70–107. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-908-3.ch005.
Full textKarydi, Dimitra, and Ioannis Karydis. "Greek Copyright Law Framework for Musical Databases and Academic Research Use." In Advances in Multimedia and Interactive Technologies, 278–94. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0270-8.ch013.
Full textOmar, Marwan. "Insider Threats." In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 162–72. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8345-7.ch009.
Full textConference papers on the topic "Unauthorised aids"
Costovici (Mema), Denisa-Atena. "Ethics in Cyberspace – Dangers and Threats." In 2nd International Conference Global Ethics - Key of Sustainability (GEKoS). LUMEN Publishing House, 2021. http://dx.doi.org/10.18662/lumproc/gekos2021/6.
Full textMatúš, Peter, and Matúš Materna. "Approaches of chosen air navigation services providers to UAV integration into air traffic control systems." In Práce a štúdie. University of Zilina, 2021. http://dx.doi.org/10.26552/pas.z.2021.2.26.
Full text