Browsing by Title

H...............H

Browsing by Title

Sort by: Order: Results:

  • Odello, Marco (2008-10-01)
    The practice of international peace missions has become a very challenging area of research. They were initially established within the United Nations (UN) system, under the inherent powers provided by the UN Charter to ...
  • Piotrowicz, Ryszard Wilson (Cambridge University Press, 2010-02-01)
    This chapter considers the relevance of human security to people trafficking. It concludes that human security as an idea may be helpful in guiding states' behaviour with regard to the victims of traffickers but rejects ...
  • Venkateswarlu, K.; Kelly, Steven L.; Kaderbhai, Naheed N.; Lamb, David C.; Kaderbhai, Mustak A.; Kelly, Diane E. (2001-11-01)
    Human sterol 14α-demethylase (P45051; CYP51) catalyzes the oxidative removal of the C32 methyl group of dihydrolanosterol, an essential step in the cholesterol biosynthetic pathway. The reaction is dependent upon NADPH ...
  • Piotrowicz, Ryszard; Redpath-Cross, Jillyanne (Cambridge University Press, 2012-11)
  • Williams, John (2001-08)
    The decision to allow the force-feeding of Ian Brady raises many complex ethical and legal issues. Early case law sanctioned force-feeding, as suicide was illegal. However, this raises the question of whether death by ...
  • Williams, John (2008-11-05)
    The decision to allow the force-feeding of Ian Brady raises many complex ethical and legal issues. Early case law sanctioned force-feeding, as suicide was illegal. However, this raises the question of whether death by ...
  • Woods, Michael (2008-09-10)
  • Huntley 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 1 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 2 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 3 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 4 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 5 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 6 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 7 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Hwfa 8 
    Prosiect AHRC ar Welsh Genealogies P.C. Bartrum; AHRC Project on P.C. Bartrum’s Welsh Genealogies (Adran y Gymraeg, Prifysgol Aberystwyth/Welsh Department, Aberystwyth University, 2010)
  • Perry, K.; Haresign, William; Wathes, D. C.; Khalid, M. (2010-07-01)
    The complex anatomy of the ovine cervix limits the success of trans-cervical artificial insemination in sheep. However, there is a degree of natural relaxation of cervix at oestrus that is accompanied by an increase in the ...
  • Powers, Simon; He, Jun (2008-08-01)
    Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer systems over a network. Two broad approaches exist to tackle this problem: anomaly detection and misuse detection. An ...
  • Powers, Simon; He, Jun (2009-05-28)
    Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer systems over a network. Two broad approaches exist to tackle this problem: anomaly detection and misuse detection. An ...

Search Cadair

Browse

My Account