| 141 |
|
Das Schicksal des Sisyphos Vaclav Havels Vermachtnis
|
Auer, S.
|
Deutsche Verlags-Anstalt.
|
2012
|
|
|
|
| 142 |
|
Das Steuerrecht zwischen Gläubigerschutz und Sanierungskultur
|
Carl-Christian Freidank; Mario Henry Schröder
|
Otto Schmidt
|
2012
|
|
|
|
| 143 |
|
Das Territorialitätsprinzip und seine Umsetzung im Entwurf der Richtlinie űber eine Common Consolidated Corporate Tax Base (CCCTB)
|
M. Lang
|
Otto Schmidt
|
2012
|
|
|
|
| 144 |
|
Das Unterhaltsrecht in der familienrichterlichen Praxis.
|
Daniela Schlüter
|
Biederstein
|
2012
|
|
|
|
| 145 |
|
Das Verhältnis von Kostenaufhebung und Kostenteilung im Amtsgerichtsprozess
|
Henrik Gemmer
|
Biederstein
|
2012
|
|
|
|
| 146 |
|
Das Vetorecht der Quellen Baberowski und die Massenverfolgung im Grossen Terror
|
Junge, M.
|
Deutsche Verlags-Anstalt.
|
2012
|
|
|
|
| 147 |
|
Das weißrussische Verfassungsgericht: Vom Verteidiger der demokratischen Verfassung zum Notar des autoritären Präsidialregimes
|
Sylvia v. Steinsdorff
|
Berliner Wissenschafts-Verlag.
|
2012
|
|
|
|
| 148 |
|
Data and Decision-Making: Connecting the Big Disconnect
|
|
Penton/IPC
|
2012
|
|
|
|
| 149 |
|
Data attack of the cybercriminal: Investigating the digital currency of cybercrime
|
Hunton, P.
|
Elsevier Science B.V., Amsterdam.
|
2012
|
|
|
|
| 150 |
|
Databases in the cloud: How business communication is changing
|
Sparks, A.
|
Palgrave Macmillan
|
2012
|
|
|
|
| 151 |
|
Database Submission-The ISMS Durable Goods Data Sets We describe the features and some characteristics of the ISMS Durable Goods data sets
|
Ni, J.; Neslin, S.A.; Sun, B.
|
Institute for operations research and the managemet sciences(INFORMS)
|
2012
|
|
|
|
| 152 |
|
Data breach disclosure laws:a state-by-state perspective
법학도서관 대출가능
|
Philip Alexander
|
Aspatore Books
|
2012
|
|
|
|
| 153 |
|
Data breach notification law in the EU and Australia - Where to now?
|
Burdon, M.; Lane, B.; von Nessen, P.
|
Elsevier Science B.V., Amsterdam.
|
2012
|
|
|
|
| 154 |
|
Data governance — Protecting and managing the value of your customer data assetsStage 3: Identifying and controlling the risk in using third-party processors
|
Gregory, A.; Bentall, L.
|
Henry Stewart Publications
|
2012
|
|
|
|
| 155 |
|
Data-hungry iPhones overburden networks
|
unknown
|
CIO Pub.
|
2012
|
|
|
|
| 156 |
|
Data, Methods, and Theoretical Implications
|
Hannagan, R.J.; Schneider, M.C.; Greenlee, J.S.
|
American Political Science Association
|
2012
|
|
|
|
| 157 |
|
Data mining for the development of a global port-to-port freight movement database
|
Wang, J.; Pulat, P.S.; Shen, G.
|
Inderscience Publishers
|
2012
|
|
|
|
| 158 |
|
Data mining for the online retail industry: A case study of RFM model-based customer segmentation using data mining
|
Chen, D.; Sain, S. L.; Guo, K.
|
Palgrave Macmillan
|
2012
|
|
|
|
| 159 |
|
Data mining framework for customer lifetime value-based segmentation
|
Aeron, H.; Kumar, A.; Moorthy, J.
|
Palgrave Macmillan
|
2012
|
|
|
|
| 160 |
|
Data mining in rail transport delay chain analysis
|
Wallander, J.; Makitalo, M.
|
Inderscience Publishers
|
2012
|
|
|
|