| 1321 |
|
HAC estimation in a spatial framework
|
Kelejian, H. H.; Prucha, I. R.
|
Elsevier Science B.V., Amsterdam.
|
2007
|
|
|
|
| 1322 |
|
HAC estimation in spatial panels
|
Moscone, F.; Tosetti, E.
|
Elsevier Science B.V., Amsterdam.
|
2012
|
|
|
|
| 1323 |
|
Hachette, la culture du monopole
|
unknown
|
Alternatives economiques
|
2013
|
|
|
|
| 1324 |
|
Hack Attack: Cybersecurity isn't just IT's problem; employees must be trained to avoid information breaches, e-mail scams, and more
|
Dutton, G.
|
Gellert Pub. Corp.
|
2012
|
|
|
|
| 1325 |
|
Hackback: Permitting Retaliatory Hacking by Non-State Actors as Proportionate Countermeasures to Transboundary Cyberharm
|
Messerschmidt, J.E.
|
Columbia Journal of Transnational Law Association
|
2013
|
|
|
|
| 1326 |
|
HACKED (cover story)
|
Roberts, Jeff John ; Lashinsky, Adam
|
Time, inc., etc.]
|
2017
|
|
|
|
| 1327 |
|
Hackenberg: Effektives Management in der insolvenzrechtlichen vorläufigen Eigenverwaltung
|
|
Recht und Wirtschaft
|
2020
|
|
|
|
| 1328 |
|
Hacker acquitted on `addiction' defence
|
unknown
|
ELSEVIER APPLIED SCIENCE PUBLISHERS LTD
|
1993
|
|
|
|
| 1329 |
|
HACKER BAD BOY VENTURE CAPITALIST DISRUPTER HEALER
|
Leaf, Clifton
|
Time, inc., etc.]
|
2016
|
|
|
|
| 1330 |
|
Hacker Insurance Now Part of the Business Risk Management Kit
|
Hancock, B.
|
ELSEVIER
|
2000
|
|
|
|
| 1331 |
|
Hacker needed money for university education
|
unknown
|
ELSEVIER APPLIED SCIENCE PUBLISHERS LTD
|
1993
|
|
|
|
| 1332 |
|
Hacker, Propaganda, Wahlmanipulation Moskaus Informationskrieg im Westen
|
Wehner, Markus
|
Deutsche Verlags-Anstalt
|
2017
|
|
|
|
| 1333 |
|
HACKERS ARE GETTING BOLDER
|
O'Keefe, Brian
|
Time, inc., etc.]
|
2017
|
|
|
|
| 1334 |
|
Hackers are still outwitting IT security
|
unknown
|
CIO Pub
|
2014
|
|
|
|
| 1335 |
|
Hackers Breach Firewall-1
|
Hancock, B.
|
ELSEVIER
|
2000
|
|
|
|
| 1336 |
|
Hackers: Freedom fighters of the 21st Century
|
Kovacich, G. L.
|
ELSEVIER SCIENCE
|
1999
|
|
|
|
| 1337 |
|
Hackerspaces: a case study in the creation and management of a common pool resource
|
MICHAEL R. WILLIAMS ; JOSHUA C. HALL
|
Cambridge University Press
|
2015
|
|
|
|
| 1338 |
|
HACKERS PICK OFF CELEBRITY EXECS ON TWITTER
|
Hackett, Robert
|
Time, inc., etc.]
|
2016
|
|
|
|
| 1339 |
|
Hackers pose threat to US information highway
|
unknown
|
ELSEVIER APPLIED SCIENCE PUBLISHERS LTD
|
1994
|
|
|
|
| 1340 |
|
Hackers’ self-selection in crowdsourced bug bounty programs
|
Arrah-Marie Jo
|
Editions techniques et e?conomiques.
|
2020
|
|
|
|