Literatura científica selecionada sobre o tema "Protect"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Protect".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Protect"
Chen, Huan, Liling Zhou e Shufang Han. "Protest and protect". Journal of Asian Pacific Communication 27, n.º 1 (11 de maio de 2017): 99–120. http://dx.doi.org/10.1075/japc.27.1.06che.
Texto completo da fonteCORDLE, DANIEL. "Protect/Protest: British nuclear fiction of the 1980s". British Journal for the History of Science 45, n.º 4 (dezembro de 2012): 653–69. http://dx.doi.org/10.1017/s0007087412001112.
Texto completo da fonteBhatt, Nikhil J., Mona M. Abaza, Kanwar S. Kelley, Ayesha N. Khalid, Steve Church, William Matthes e K. J. Lee. "Protect Your Practice, Protect Yourself, and Protect Your Family". Otolaryngology–Head and Neck Surgery 151, n.º 1_suppl (setembro de 2014): P9. http://dx.doi.org/10.1177/0194599814538403a6.
Texto completo da fonteMartinez-Ortiz, Wilnelly, e Ming-Ming Zhou. "Could PROTACs Protect Us From COVID-19?" Drug Discovery Today 25, n.º 11 (novembro de 2020): 1894–96. http://dx.doi.org/10.1016/j.drudis.2020.08.007.
Texto completo da fonteFox, Eleanor M. "“We Protect Competition, You Protect Competitors”". World Competition 26, Issue 2 (1 de junho de 2003): 149–65. http://dx.doi.org/10.54648/woco2003002.
Texto completo da fonteREBMANN, TERRI. "Protect yourself, protect your patients". Nursing Made Incredibly Easy! 5, n.º 1 (janeiro de 2007): 30–39. http://dx.doi.org/10.1097/00152258-200701000-00008.
Texto completo da fonteKatz, Barbara. "Protect Your Paperwork, Protect Your Identity". Emergency Medicine News 30, n.º 11 (novembro de 2008): 32. http://dx.doi.org/10.1097/01.eem.0000340968.24163.5a.
Texto completo da fonteThe Lancet. "Protect the kidney, protect the heart". Lancet 375, n.º 9722 (abril de 2010): 1226. http://dx.doi.org/10.1016/s0140-6736(10)60524-7.
Texto completo da fonteWaters, Rebecca. "Protect your hands: protect your health". Dental Nursing 15, n.º 11 (2 de novembro de 2019): 562–63. http://dx.doi.org/10.12968/denn.2019.15.11.562.
Texto completo da fonteGonsoulin, Sid, e Daniel M. Wax. "Protect Our Program! Protect Our Referees!" Recreational Sports Journal 13, n.º 3 (maio de 1989): 54–56. http://dx.doi.org/10.1123/nirsa.13.3.54.
Texto completo da fonteTeses / dissertações sobre o assunto "Protect"
Alhabashneh, Mohammad Abad Alhameed. "Protect team handler (PTH)". Thesis, University West, Department of Technology, Mathematics and Computer Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-567.
Texto completo da fonteThere is always a need for easy-to-follow processes that enable accurate and non-time consuming solutions. Nowadays we see a lot of different approaches to development processes in software engineering. This project is concerned with how to manage a software development process in a reliable, secure and efficient way. Software is available which provides some help for project managers / administrators to work more productively, with effective communication. Using such systems, it is possible to keep track of all the phases of development, including task distribution, making maximum use of previous hands-on experience and increasing productivity, to deliver a finished product in minimum time. No existing solution, however, fulfills all the desirable criteria. This paper describes the motivation, design and implementation of an improved development management system using Active Server Pages and Microsoft Internet Information Services with a backend Microsoft Access Database developed using a waterfall software development process. The resulting system is described and evaluated. This system will be beneficial for software houses, because they can communicate on the web, allowing efficiency gains by avoiding the need to call meetings for distribution of tasks among employees, with the additional advantage of location-transparent team management through the Internet.
Ярмак, Любов Павлівна, Любовь Павловна Ярмак, Liubov Pavlivna Yarmak e N. Novatarska. "To protect our environment". Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/15998.
Texto completo da fonteShaibah, Hassan S. "Does Wld's protect in Drosophila?" Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439380.
Texto completo da fontePollentine, Marc. "Constructing the responsibility to protect". Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/43100/.
Texto completo da fontePochatko, T. V. "Ways to protect your ideas". Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/62829.
Texto completo da fonteHuang, Yaping. "Organic Coatings to Protect Ferrous Structures". Diss., North Dakota State University, 2013. https://hdl.handle.net/10365/27125.
Texto completo da fonteDepartment of Energy
North Dakota State University. Department of Coatings and Polymeric Materials
MARTINS, THEO COTRIM. "DO MANDATORY DIVIDEND RULES PROTECT MINORITY SHAREDHOLDERS?" PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=16280@1.
Texto completo da fonteThis paper shows that Brazil s mandatory dividend rules partly explain why its average dividend yield is higher than in the U.S. And yet, several Brazilian firms bypass the mandatory dividend rules. We show that 42% of a broad sample of nonfinancial firms with shares listed at Bovespa use legal loopholes to pay fewer dividends than the amount that their statutes call for. The data suggest that the main reason for these firms to bypass the dividend rules is not to ensure financing for new projects. Instead, lower dividend payments seem to pave the way for the controlling shareholders to dilute the cash-flow rights of minority shareholders. Thus, short of credit crunch, the Brazilian mandatory dividend rules do protect minority shareholders, without making harder for firms to finance investment opportunities.
Hayes, Kelli A. "Logical extensions of the responsibility to protect". Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2197.
Texto completo da fonteENGLISH ABSTRACT: Are violent and non-violent mass atrocities morally different? According to the United Nations, they are. But why? The answer to this question is important as it in part determines our obligations to people living in other countries. This thesis seeks to determine if violent and non-violent mass atrocities are morally different and, if not, whether the latter should be included under the United Nations’ doctrine of the responsibility to protect. In order to do this, the thesis first examines the conditions under which sovereignty exists in order to understand when intervention can occur. It also analyzes just war theory to discern when military intervention to halt nonviolent mass atrocities is justified. Having established these two concepts, the thesis then presents three arguments for why non-violent mass atrocities are morally indistinguishable from violent ones and should also be included under the doctrine of the responsibility to protect. A discussion of the feasibility of implementing this extension and the long-term effects of these types of interventions follows. Finally, the thesis contains three case studies in order to apply the arguments presented earlier.
AFRIKAANSE OPSOMMING: Is daar ‘n morele verskil tussen gewelddadige en nie-gewelddadige gruweldade? Volgens die Verenigde Nasies is daar so ‘n verskil, maar hoekom? Die antwoord tot hierdie vraag is deels belangrik omdat dit ons verantwoordelikhede tot mense in ander lande bepaal. In hierdie tesis word daar gepoog om te bepaal of daar so ‘n verskil tussen gewelddadige en nie-gewelddadige gruweldade is, en, indien nie, of nie-gewelddadige gruweldade ook moet tel onder die Verenige Nasies se verantwoordelikheid om te beskerm. Die tesis poog eerstens om die kondisies vir soewereiniteit te bepaal ten einde te probeer verstaan wanneer ‘n intervensie moreel regverdigbaar is. Dit analiseer ook die teorie van geregverdigde oorlogvoering ten einde te bepaal wanneer militêre inmenging om nie-gewelddadige gruweldade stop te sit geregverdig is. Na hierdie twee konsepte ondersoek is word daar drie argumente verskaf om aan te toon dat nie-gewelddadige gruweldade nie moreel onderskeibaar is van gewelddadige gruweldade nie, en dus dat nie-gewelddadige gruweldade onder die verantwoordelikheid om te beskerm behoort te tel. Dit word gevolg deur ‘n bespreking van die praktiese haalbaarheid van die implementering van so ‘n uitbreiding van die verantwoordelikheid om te beskerm, asook ‘n bespreking van die langtermyn effekte van hierdie tipes intervensies. Die tesis eindig met drie gevallestudies ten einde die argumente wat reeds gemaak is toe te pas.
Asher, Courtani. "Project protect and nurture| A grant proposal". Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10076460.
Texto completo da fonteThe purpose of this project was to write a grant proposal to identify resource materials that can be used in whole or adapted for a series of workshops for K–6 school social workers and their colleagues (teachers, counselors, and support staff) aimed at enhancing their knowledge and skills in child abuse and trauma prevention and intervention. The potential host agency will be Dr. Albert Schweitzer Elementary, a school in Anaheim, California. The grant writer developed the project after an extensive review of the literature available on child abuse and trauma. The project seeks to provide social workers and their colleagues with the skills and knowledge needed to aid in the prevention and treatment of child abuse and trauma. The Weingart Foundation was chosen as the potential funding source for this project. The actual funding and submission of this grant proposal was not a requirement for successful completion of this project.
Mazzanti, Maria Rita. "From State sovereignty to responsibility to protect". Paris, Institut d'études politiques, 2013. https://spire.sciencespo.fr/notice/2441/45eb019724sn6sg9mcu4j489l.
Texto completo da fonteThe research was aimed at understanding by means of which developments in the political and legal thinking the R2P finally reached its present shape. To this end, we analyzed on one side the evolution of the concept of absolute sovereignty and the shift towards an increased involvement of the international community in the internal affairs of the individual states, and, on the other side, the modifications incurred in the concept of intervention for humanitarian purposes and the lessons learned out of the experiences of the 1990s. We have argued that what R2P is, or is not, should be understood in the light of this long development. Having then established what now R2P is about we wanted to measure to which extent R2P was able, in the ten years of its existence, to influence the behavior of the international community, and in particular of the United Nations Security Council. Hence, we selected four cases – Libya, Côte d’Ivoire Sri Lanka and Syria – where R2P was invoked or should have been invoked, with the aim of finding regularities useful for guiding future action. Our research hypothesis was that R2P is influenced by five main independent variables, namely: the dynamic within the Security Council (active involvement of some specific countries/country representatives); reasonable perspective of success/attractive cost-benefit profile; the role of the relevant regional/sub-regional organizations; the activity of the Human Rights Council; and the action of civil society
Livros sobre o assunto "Protect"
Barnham, Kay. Protect nature. New York: Crabtree Pub. Co., 2008.
Encontre o texto completo da fonteEricson, Carol. Conceal, protect. Don Mills, Ont: Harlequin Enterprises Ltd., 2013.
Encontre o texto completo da fonteProtect nature. London: Wayland, 2008.
Encontre o texto completo da fontePolice, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2003.
Encontre o texto completo da fontePolice, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2004.
Encontre o texto completo da fonteMills, DiAnn. Sworn to protect. Carol Stream, Ill: Tyndale House, 2010.
Encontre o texto completo da fonteWerner, Patricia. His to protect. Richmond: Silhouette, 2000.
Encontre o texto completo da fonteProtect Your Patent. Naperville: Sourcebooks, Inc., 2005.
Encontre o texto completo da fonteCompany, Carson-Dellosa Publishing, ed. Protect!: Wild animals. Greensboro, NC: Carson-Dellosa, 2014.
Encontre o texto completo da fonteWerner, Patricia. His to protect. Richmond: Silhouette, 2000.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Protect"
Weik, Martin H. "protect". In Computer Science and Communications Dictionary, 1358. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14964.
Texto completo da fonteMelone, Michael. "Protect". In Designing Secure Systems, 83–124. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003144182-10.
Texto completo da fonteEarle, Sylvia. "Protect the Ocean, Protect Ourselves". In Coastal Change, Ocean Conservation and Resilient Communities, 155–61. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41914-5_11.
Texto completo da fonteBährle-Rapp, Marina. "protect(ing)". In Springer Lexikon Kosmetik und Körperpflege, 456. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_8589.
Texto completo da fonteCordle, Daniel. "Protect–Protest: Introducing the Nuclear 1980s". In Late Cold War Literature and Culture, 1–24. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51308-3_1.
Texto completo da fonteCooper, Richard H., e Juliette Voïnov Kohler. "Introduction The Responsibility to Protect". In Responsibility to Protect, 1–12. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_1.
Texto completo da fonteSchulz, William F. "Spread Wide the Word". In Responsibility to Protect, 145–59. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_10.
Texto completo da fonteSimmons, Adele, e April Donnellan. "Reaching Across Borders". In Responsibility to Protect, 163–78. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_11.
Texto completo da fonteFeinstein, Lee, e Erica De Bruin. "Beyond Words". In Responsibility to Protect, 179–98. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_12.
Texto completo da fonteVolk, Joe, e Scott Stedjan. "Building Structures for Peace". In Responsibility to Protect, 199–218. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_13.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Protect"
Kumar, Udayan, Gautam Thakur e Ahmed Helmy. "PROTECT". In the 6th International Wireless Communications and Mobile Computing Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1815396.1815543.
Texto completo da fonteLindner, Steffen, Daniel Merling, Marco Häberle e Michael Menth. "P4-Protect". In CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426744.3431327.
Texto completo da fonteShenoy, Jayanth, Zikun Liu, Bill Tao, Zachary Kabelac e Deepak Vasisht. "RF-protect". In SIGCOMM '22: ACM SIGCOMM 2022 Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3544216.3544256.
Texto completo da fonteUriel Gallego, Marta, Edgar Abarca Lachén, Nuriea Berenguer Torrijo, Loreto Saez-Benito, Ana Sáez-Benito Suescun e Carlota Gómez Rincón. "PROTECT YOURSELF FROM THE SUN, PROTECT YOURSELF FROM LUPUS". In International Conference on Education and New Learning Technologies. IATED, 2017. http://dx.doi.org/10.21125/edulearn.2017.1408.
Texto completo da fontePage, D. "Protect and survive". In DEFENCE SITES: HERITAGE AND FUTURE 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/dshf120081.
Texto completo da fonteKim, Kyung-chul, e Eun hye Kim. "Let’s Protect Precious Crayfishes!" In Advanced Science and Technology 2017. Science & Engineering Research Support soCiety, 2017. http://dx.doi.org/10.14257/astl.2017.143.09.
Texto completo da fonteHutchinson, Shinelle, Bing Zhou e Umit Karabiyik. "Are We Really Protected? An Investigation into the Play Protect Service". In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006100.
Texto completo da fonteToll, D., E. Engman, K. Arsenault, L. Friedl, C. Peters-Lidard, A. Pinheiro, J. Nigro e J. Triggs. "Protect and Monitor Water Resources". In 2006 IEEE International Symposium on Geoscience and Remote Sensing. IEEE, 2006. http://dx.doi.org/10.1109/igarss.2006.900.
Texto completo da fonteШахаева, Фатима Магомедовна, e Сайд-Магомед Аббазович Осмаев. "WARNING WAYS TO PROTECT COPYRIGHT". In Высокие технологии и инновации в науке: сборник избранных статей Международной научной конференции (Санкт-Петербург, Май 2020). Crossref, 2020. http://dx.doi.org/10.37539/vt185.2020.28.78.019.
Texto completo da fontePoulallion, P. L., L. A. de Abreu Moreira e J. L. R. Dominguez. "Protect the Forest With LNG". In SPE Gas Technology Symposium. Society of Petroleum Engineers, 1993. http://dx.doi.org/10.2118/26162-ms.
Texto completo da fonteRelatórios de organizações sobre o assunto "Protect"
Newmark, R. Innovative Technologies to Protect Water Supplies. Office of Scientific and Technical Information (OSTI), julho de 2004. http://dx.doi.org/10.2172/15014411.
Texto completo da fonteDoerry, Armin W. Radar Design to Protect Against Surprise. Office of Scientific and Technical Information (OSTI), fevereiro de 2015. http://dx.doi.org/10.2172/1171595.
Texto completo da fonteErin Eastwood, Erin Eastwood. Using DNA to Protect Fiji's Fisheries. Experiment, janeiro de 2014. http://dx.doi.org/10.18258/1836.
Texto completo da fonteJishnu, Das, Benjamin Daniels e Tahir Andrabi. We Have to Protect the Kids. Research on Improving Systems of Education (RISE), maio de 2020. http://dx.doi.org/10.35489/bsg-rise-ri_2020/016.
Texto completo da fonteSadun, Raffaella. Does Planning Regulation Protect Independent Retailers? Cambridge, MA: National Bureau of Economic Research, janeiro de 2014. http://dx.doi.org/10.3386/w19797.
Texto completo da fonteMarter, W. L. Proposed Release Guides to Protect Aquatic Biota. Office of Scientific and Technical Information (OSTI), março de 2001. http://dx.doi.org/10.2172/781033.
Texto completo da fontePangman, Dale. Can the U.S. Adequately Protect Its Forces? Fort Belvoir, VA: Defense Technical Information Center, junho de 1997. http://dx.doi.org/10.21236/ada328095.
Texto completo da fonteSeyle, D. Conor. Business Participation in the Responsibility to Protect. One Earth Future Foundation, abril de 2013. http://dx.doi.org/10.18289/oef.2013.007.
Texto completo da fonteHillman, K. THYRATRON-PROTECT SYSTEM FOR POLARIZED PROTON MODULATORS. Office of Scientific and Technical Information (OSTI), junho de 1985. http://dx.doi.org/10.2172/1151134.
Texto completo da fonteAtack, Jeremy, e Fred Bateman. Whom Did Protective Legislation Protect? Evidence From 1880. Cambridge, MA: National Bureau of Economic Research, dezembro de 1991. http://dx.doi.org/10.3386/h0033.
Texto completo da fonte