Showing
1 - 4
results of
4
Skip to content
Institutional Login
Language
English
Te reo Māori
Books & media
Combined Results
Books & media
Articles & more
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Search Results - 9781424451142~
Suggested Topics within your search.
Suggested Topics within your search.
Boundaries in literature
1
Boundaries in motion pictures
1
History
1
Islam
1
Israel-Arab Border Conflicts, 1949-
1
Māturīdīyah
1
Political aspects
1
Slavery
1
Showing
1 - 4
results of
4
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
Transcendent God, rational world : a Māturīdī theology /
by
Harvey, Ramon
Published 2021
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
JSTOR Open Access
Request this item
Save to List
Saved in:
Select result number 2
2
The politics of slavery /
by
Brace, Laura
Published 2018
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
JSTOR Open Access
Request this item
Save to List
Saved in:
Select result number 3
3
Israel/Palestine : border representations in literature and film /
by
Paul, Drew
Published 2020
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Click here to view this book
Request this item
Save to List
Saved in:
Select result number 4
4
Hume's scepticism : pyrrhonian and academic /
by
Fosl, Peter S.
Published 2020
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Click here to view this book
Request this item
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
RSS Feed
–
Email Search
–
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Location
Online
4 results
4
Item type
Ebook
4 results
4
Year of Publication
From:
To:
Items from Articles & more search
A new high-performance approach for offline replacement attack prevention in trusted clients
by
Ghaleh, Hossein Rezaei
, et al.
Improving the reliability of embedded systems with cache and SPM
by
Meng Wang
, et al.
A heuristic policy-based system call interposition in Dynamic Binary Translation
by
Deen Zheng
, et al.
Strong authentication with mobile phone as security token
by
Do van Thanh
, et al.
Adaptive security and trust management for autonomic message-oriented middleware
by
Abie, Habtamu
More results…