Buy hartaromaniei.eu ?

Products related to Threats:


  • Climatic and Environmental Threats to Cultural Heritage
    Climatic and Environmental Threats to Cultural Heritage

    Climatic and Environmental Threats to Cultural Heritage examines the challenges that environmental change, both sudden and long-term, poses to the preservation of cultural material. Acknowledging the diversity of human cultural heritage across collecting institutions, heritage sites and communities, the book highlights how, in Australia, Southeast Asia and the Pacific, the quest to preserve such precious knowledge relies on records and narratives being available to inform decisions now and into the future.Bringing together a diverse range of stakeholders who have an interest in – and responsibility for – the care of cultural heritage material and places of cultural heritage value, the book explores their thinking on and actions in relation to issues of climate change and environmental risk.Sloggett and Scott highlight the stakeholders’ shared interest in drawing on their expertise to meet the challenges that environmental change brings to the future of our cultural heritage and our cultural identity.Based on the understanding that this global challenge requires local, national and international co-operation, the book also considers how local knowledge can have international application. Climatic and Environmental Threats to Cultural Heritage will be of interest to those engaged in the study of heritage, conservation, archaeology, archives, anthropology, climate change and the environment.It will also be useful to practitioners and others attempting to understand the effect of environmental change on cultural heritage around the globe.

    Price: 35.99 £ | Shipping*: 0.00 £
  • Little Threats
    Little Threats


    Price: 13.99 £ | Shipping*: 3.99 £
  • Biodiversity : Threats and Conservation
    Biodiversity : Threats and Conservation

    The term "biodiversity" or "biological diversity" describes the variety of living beings on Earth encompassing microorganisms, plants, animals, and ecosystems, such as coral reefs, forests, and deserts.In fact, it also represents a wealth of biological resources available to us.Today, instead of exploring and preserving its unmapped biodiversity, mankind has gone away from mother nature, conquering the domain through relentless exploitation.This has resulted in an ecological imbalance and thereby has posed serious threat to biodiversity.Declining biodiversity is, therefore, a concern for countless reasons.Biodiversity’s wealth of genetic information can be conserved by storing biological material from endangered species.Cell lines, gametes, and embryos are preserved so that in case a species becomes extinct or there is a need to increase the population of the species, then cloning and artificial reproductive techniques can be used to revive and reproduce the said species.The present volume discusses the biodiversity of specific animal groups, such as cnidarians and fish, as well as potential risks to and methods for conserving some of them.The following important aspects are addressed: 1. The importance of biodiversity in maintaining ecosystem balance for sustainability 2.The emerging role of biodiversity as a source of important materials, pharmaceuticals, food, and so on as such or through genetic manipulation to meet the contemporary and future challenges 3.The impact of environment degradation on biodiversity and conservation in a changing environment 4.Conventional and emerging biotechnological techniques to conserve biodiversity The book is intended for academics, scientists, and naturalists working in the fields of biology, biochemistry, biophysics, and biomedical sciences.

    Price: 160.00 £ | Shipping*: 0.00 £
  • Fallen Threats Steam CD Key
    Fallen Threats Steam CD Key

    Fallen Threats is a roguelike with some RPG elements, where you have to defeat the final boss to complete the game, for this you have to go through levels, each time hardest than the other, explore a randomly generated dungeon pick up loot, level up, fight enemies and bosses, buy new swords, go deeper and use your abilities. How long will you survive? Explore a random dungeon generated, pick up loot, level up, fight enemies and bosses, buy new swords, go deeper and use your abilities. Will yo...

    Price: 0.86 € | Shipping*: 0.00 GBP €
  • Which parenting methods involve threats?

    Parenting methods that involve threats include authoritarian parenting, where parents use fear and punishment to control their children's behavior. This can include threats of punishment or consequences if the child does not comply with the parent's demands. Threats can also be present in permissive parenting, where parents may use threats to try to gain control over their children when they feel they have lost authority. However, it's important to note that using threats as a parenting method can have negative effects on a child's emotional well-being and can damage the parent-child relationship.

  • Are threats punishable by law?

    Yes, threats can be punishable by law. In many jurisdictions, making threats of violence or harm towards another person is considered a criminal offense. Depending on the severity of the threat and the laws of the specific jurisdiction, individuals who make threats may face charges such as harassment, intimidation, or making terroristic threats. It is important to report any threats to the appropriate authorities so that they can be investigated and addressed according to the law.

  • What is a cultural heritage?

    Cultural heritage refers to the traditions, customs, beliefs, and artifacts that are passed down from generation to generation within a society. It encompasses the tangible and intangible aspects of a culture, including historical sites, monuments, art, music, language, and rituals. Cultural heritage plays a crucial role in shaping a community's identity and preserving its unique heritage for future generations. It is an important part of a society's history and contributes to its sense of belonging and continuity.

  • What are funny threats on Instagram?

    Funny threats on Instagram can include playful warnings like "I'll steal all your snacks" or "I'll flood your feed with cat videos." These threats are usually meant to be lighthearted and humorous, adding a fun twist to interactions on the platform. They are a way to engage with followers in a playful manner without any real intention of harm.

Similar search terms for Threats:


  • Veiled Threats : Women and Global Jihad
    Veiled Threats : Women and Global Jihad

    Veiled Threats challenges the idea that women in violent terrorist groups lack agency.Too often, these women are assumed to be controlled by men: their fathers, their husbands, or some other male relative.Mia Bloom contests this narrow understanding. Although extremist groups often control different aspects of women's lives, including their religious obligations or dress, jihadi women have asserted themselves in myriad ways.Bloom interrogates the prevailing perceptions about women's involvement in violent extremism exclusively as victims: manipulated, drugged, or coerced.Following her pioneering work on women in Bombshell, Bloom lifts the veil of the secret world of women in jihadi groups to provide a nuanced and complex explanation of their motivations and challenge misperceptions about women's agency.Veiled Threats explores the range of roles of the women involved in jihad—not only across secular and religious groups but within affiliated religious groups—and examines how these extremist groups have used rape as a weapon of war.Bloom explains how women are used and abused, deployed and destroyed, and the many ways in which their roles in terrorism have evolved over the past three decades.

    Price: 108.00 £ | Shipping*: 0.00 £
  • Aromas of Asia : Exchanges, Histories, Threats
    Aromas of Asia : Exchanges, Histories, Threats

    A uniquely powerful marker of ethnic, gender, and class identities, scent can also overwhelm previously constructed boundaries and transform social-sensory realities within contexts of environmental degradation, pathogen outbreaks, and racial politics.This innovative multidisciplinary volume critically examines olfaction in Asian societies with the goal of unlocking its full potential as an analytical frame and lived phenomenon. Featuring contributions from international scholars with deep knowledge of the region, this volume conceptualizes Asia and its borders as a dynamic, transnationally connected space of olfactory exchange.Using examples such as trade along the Silk Road; the diffusion of dharmic religious traditions out of South Asia; the waves of invasion, colonization, and forced relocation that shaped the history of the continent; and other “sensory highways” of contact, the contributors break down essentializing olfactory tropes and reveal how scent functions as a category of social and moral boundary-marking and boundary-breaching within, between, and beyond Asian societies.Smell shapes individual, collective, and state-based memory, as well as discourses about heritage and power.As such, it suggests a pervasive and powerful intimacy that contributes to our understanding of the human condition, mobility, and interconnection. In addition to the editors, the contributors to this volume include Khoo Gaik Cheng, Jean Duruz, Qian Jia, Shivani Kapoor, Adam Liebman, Lorenzo Marinucci, Peter Romaskiewicz, Saki Tanada, Aubrey Tang, and Ruth E.Toulson.

    Price: 95.95 £ | Shipping*: 0.00 £
  • Threats in Context : Identify, Analyze, Anticipate
    Threats in Context : Identify, Analyze, Anticipate

    Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarily—and hinges upon—the correct evaluation of the threat.According to the author, all the other stages of the risk evaluation are, in fact, dependent on getting the understanding and measurement of the threat right.Despite this truism, many risk assessment methods (i.e., the process of determining the threat) tend to rush through a vague typology, offer minimal classifications, utilize an often-outdated list of potential malevolent actions—all of which are based on precedent occurrences.There should be a way to improve on this: a way to provide security practitioners and analysts better tools to deal with the task of analyzing threats and risk and to prepare for such contingencies appropriately.The book begins with a retrospective on the threats from the 1960s through to the present.The list is long and includes hijackings and airport attacks, piracy, drug smuggling, attacks on trains, pipelines, city-wide multi-site attacks, road attacks, workplace shootings, lone wolf attacks, drone attacks, bombings, IEDs, sniper attacks, random stabbings, and more.Terrorism, workplace violence, and active shooter scenarios all present asymmetric problems and unique challenges that require new ways of thinking, operationally, of risk to properly prevent, mitigate, and respond to such threats.The author demonstrates how to develop an appropriate methodology to define both current and emerging threats, providing a five-step process to self-evaluate—to determine an organization’s, a location’s, or a facility’s threats and to plan risk mitigation strategies to accurately identify, minimize, and neutralize such threats.Coverage progressively builds from correctly identifying the root threats—both global and local—to a subsequent understanding of the corollary relationship between threat, vulnerability, and risk, with the threat serving as the fundamental cornerstone of the risk evaluation.As such, Threats in Context will serve as a pivotal resource to security professionals from all backgrounds serving in a variety of fields and industries.

    Price: 55.99 £ | Shipping*: 0.00 £
  • Tangled Threats on the Nomad Highway
    Tangled Threats on the Nomad Highway

    Einstein won't allow himself to believe in fate. His wife and daughter had deserved more than three wizened crones cutting short the fabric of their existence. Fate has nothing to do with the holes in his heart and life. No, those are due entirely to a world he tries to keep in his past. Tries and fails-and now all he has is cold granite to embrace. As the only nomad for the BBMC, he takes pride in policing all potential threats to the club that has become his home and family. That includes the unwelcome, trespassing shadows from his past.Marian Threadgill still hasn't become accustomed to her new life. After years spent resigning herself to living as a broken prisoner in her childhood home, she found liberation in the form of unconventional champions: rough-and-tumble bikers who proved to her how deceiving appearances could be. In the months following her rescue, she's developed a strong sense of loyalty to the men who wear black leather and ride steel steeds. She's vowed to herself to defend them against all comers, even threats larger than they might seem.As danger once again darkens her world, Marian is thrust into an unfamiliar role. She's never seen herself as anything other than an underdog until Einstein demands so much more.

    Price: 13.99 £ | Shipping*: 3.99 £
  • What can happen with number threats?

    Number threats can lead to a variety of negative consequences, such as identity theft, financial loss, and invasion of privacy. Hackers can use number threats to gain access to sensitive information, manipulate data, or disrupt services. It is important to take measures to protect against number threats, such as using strong passwords, keeping software up to date, and being cautious about sharing personal information online.

  • How do you deal with threats?

    When faced with threats, I believe in staying calm and assessing the situation rationally. It is important to prioritize safety and seek help from authorities if necessary. I also believe in communicating openly and honestly to address any underlying issues that may be causing the threat. Finally, I try to take proactive measures to protect myself and others from potential harm.

  • What are external and internal threats?

    External threats refer to potential dangers that come from outside an organization, such as cyber attacks, natural disasters, or economic downturns. Internal threats, on the other hand, are risks that originate from within the organization, such as employee misconduct, data breaches, or operational errors. Both types of threats can have significant impacts on an organization's security, stability, and success, and it is important for businesses to have strategies in place to mitigate and address these risks.

  • Who are the threats to democracy?

    Threats to democracy can come from both external and internal sources. External threats may include foreign interference, such as cyber attacks or disinformation campaigns aimed at undermining the democratic process. Internal threats can come from within the country, such as government corruption, erosion of civil liberties, or the rise of authoritarian leaders who seek to concentrate power and limit democratic institutions. Additionally, economic inequality, social unrest, and polarization can also pose significant threats to democracy by undermining trust in democratic institutions and processes.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.