Unauthorized names of glaciers

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unauthorized Version

A 'mole' at the Bristol Royal Infirmary tells me that at the last Hospital Committee Meeting it was explained to the assembled consultants that under the rules of the new Special Trust, when they have fulfilled the Provider contract for the number of patients to be seen in a particular week, they will not be allowed to see any more.

متن کامل

Preventing Unauthorized Data Flows

Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...

متن کامل

Legal Aspects of Unauthorized Bank Payments

 One of the complex matters in banking law is the problems and mistakes which occur in the process of bank payments. Mistake of banker or error in processing of information in bank networks may result in payment delay or paying money to the account of a person other than who was really intended. This article is about rules for allocation of losses between account holders implicated and t...

متن کامل

Unauthorized Practice of Law: Arizona

IT is GENERALLY recognized that the judiciary has the power to regulate the practice of law.1 The Arizona Supreme Court, in the recent case of State Bar of Arizona v. Arizona Land Title and Trust Co.,, exercised this broad judicial power by condemning as the unauthorized practice of law a wide variety of activities commonly engaged in by 'title companies and real estate brokers in that state. T...

متن کامل

Robust Detection of Unauthorized Wireless Access Points

Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Glaciology

سال: 1971

ISSN: 0022-1430,1727-5652

DOI: 10.1017/s0022143000022139