Search

Your search keyword '"Allison, Peter A."' showing total 206 results

Search Constraints

Start Over You searched for: Author "Allison, Peter A." Remove constraint Author: "Allison, Peter A." Search Limiters Full Text Remove constraint Search Limiters: Full Text
206 results on '"Allison, Peter A."'

Search Results

1. Forty Years On: Just How Life Changing Are School Expeditions?

6. HOW TO TAKE ADVANTAGE OF OPEN SOURCE BENEFITS: Open source software may provide a cost-effective approach to building business applications, as well as ensuring transparency, but there are challenges to keep in mind.

19. Prediction of shoreline–shelf depositional process regime guided by palaeotidal modelling

23. Bryozoan carbonates through time and space

24. In situ benthos and paleo-oxygenation in the Middle Cambrian Burgess Shale, British Columbia, Canada

25. Minimal fuss

26. A drone with a ‘rotating detonation rocket engine’ approached the speed of sound.

27. WILL COMPUTATIONAL STORAGE MEET DATA PROCESSING DEMANDS? Computational storage promises performance for workloads that can benefit from dedicated oomph, but don't mistake it for a cure-all.

28. Exceptional fossil record: distribution of soft-tissue preservation through the Phanerozoic

29. Paleolatitudinal sampling bias, Phanerozoic species diversity, and the end-Permian extinction

30. Sailing across the North Sea: the development of trust in a short-term high intensity environment

31. Indoor and outdoor context-specific contributions to early adolescent MVPA as measured by combined diary, accelerometer and GPS

33. Our kind of honeymoon

34. HOW GAMIFYING CYBER TRAINING CAN IMPROVE YOUR DEFENCES.

35. Significant European scholarly titles, 1991

36. Tidal dynamics and mangrove carbon sequestration during the Oligo-Miocene in the South China Sea

37. Cyberpion founder's Russian lesson on the need to protect abandoned digital assets: The war in Ukraine and subsequent boycott of Russia resulted in a swathe of digital infrastructure being abandoned, becoming a potential vulnerability for many organisations

38. THE CYBER SECURITY IMPACT OF OPERATION RUSSIA BY ANONYMOUS: The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war?

39. WHAT THE EU'S CONTENT-FILTERING RULES COULD MEAN FOR UK TECH.

41. ATTACK OF THE CLONES.

42. RECRUITMENT RISKS: AVOIDING THE DANGERS OF FRAUDULENT CANDIDATES: How can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent?

43. Analysing constraints to participation in snowsports for pre-service teachers:A qualitative study of tourism for alpine (downhill) skiing

44. Personal development through expeditions:Interim report

45. IT TAKES A VILLAGE: PROTECTING KIDS ONLINE IS EVERYONE'S RESPONSIBILITY: The rapid uptake of smartphones among children has contributed to an increase in cyber bullying and online grooming. Can modern enterprise help to fix the problem?

46. IS THE IT SECTOR BESET BY FEAR-MONGERING?

47. ONLINE PLATFORMS TASKED WITH PROTECTING USERS.

Catalog

Books, media, physical & digital resources