Search

Your search keyword '"Request"' showing total 1,507 results

Search Constraints

Start Over You searched for: Descriptor "Request" Remove constraint Descriptor: "Request"
1,507 results on '"Request"'

Search Results

401. Noticing in task performance and learning outcomes: A qualitative analysis of instructional effects in interlanguage pragmatics

402. ESTABLISHING DERIVED REQUESTING SKILLS IN ADULTS WITH SEVERE DEVELOPMENTAL DISABILITIES.

403. What a Coincidence! The Effects of Incidental Similarity on Compliance.

404. The Rakai Project counselling programme experience.

405. Propuesta de mejoramiento para la Sistematización de Formatos en el proceso de solicitud de movilidad y tiquetes de la Vicerrectoría de Investigación y Extensión

406. Refusal Strategies of Saudi EFL Undergraduate Students

407. Redesign of service and managment of requests and complaints process in Gecelca P.S.C., applying the Six Sigma Methodology

408. VERSION CONTROL SYSTEM

409. Web Application Penetration Testing: An Introduction

410. The Normative Structure of Request

411. Kernel-mode code signing - A beginner's guide

412. Raspberry Pi Remote Access - Stealthy Approach to Internal Network Penetration Testing

413. Kompetence socialnih delavcev in delavk na centrih za socialno delo

414. Web Services as a Data Source in Splunk - A How-To Guide

415. Monitoring - Detecting Attacks with MITRE ATT&CK

416. El derecho de asilo de personas vulnerables: en especial personas que hayan padecido torturas, violaciones u otras formas graves de violencia psicológica o física o sexual y víctimas de trata de seres humanos

417. Augmented Reality and Artificial Intelligence – Use cases for Offensive Security

418. Diseño de un modelo de simulación del sistema de inventario para la empresa Ponquifon

419. The signed JSON Web Token - A supposedly Secure Token and its Weak Spots

420. Towards an assessment instrument for suffering in patients with psychiatric conditions: assessing cognitive validity

421. CIS CSAT - IT Security Assessment Tool

422. Social Engineering – Spotlight on LinkedIn

423. HTTP Strict Transport Security: Five common mistakes and how to fix them

424. Bypassing NAC - A handy How-to Guide

425. Türkçe ve İngilizce rica etkileşimlerinde kibarlık ve kabalık görünümleri

426. Rica ediminin Türkçeyi yabancı dil olarak öğrenenler tarafından kullanımları

427. Concept of complaint in public administration / O. V. Kоkhovets

429. Выявление требований и настройка системы управления инцидентами в Министерстве социальной политики Свердловской области

430. Aplikacija za platformu iOS za oglašavanje kvarova i prikupljanje ponuda za popravke

431. Speech act of request in teaching/learning Turkish as a foreign language

432. Refusal strategies of preservice EFL teachers in four speech acts: Requests, suggestions, invitations, offers

433. Las complejas relaciones entre el proceso penal y el ejercicio de las funciones parlamentarias

435. System of indication of parameters of technological process

436. Çocuklarda rica ediminin kullanımına ilişkin görünümler

437. I Have Something Interesting To Talk To You About: Speaking To Disagree, Agreeably.

442. Relevant factors for the suspension of the payment of disputed tax - A comparative analysis

443. Pragmatic assessment of request speech act of Iranian EFL learners by non-native English speaking teachers

444. 'You will probably refuse, but…': When activating reactance in a single sentence increases compliance with a request

445. Pilgrimages: Space, Polysemy and Three Cases

446. A ‘Broad Categorizer‘and Language Modeling in Relation to Selected Expressive Factors

447. The Influence of ‘Narrow’ Categorizerś Emotion on Language Processing

448. Обработка клиентских запросов с использованием облачных технологий в банковской сфере : магистерская диссертация

449. Этикетная ситуация просьба в межкультурном общении

450. Kvinnors perspektiv på preventivmedelsrådgivning : en intervjustudie

Catalog

Books, media, physical & digital resources