Röper, Martin Rothgaenger, Monika Altmühltal

16,95 €
  • Bester Preis in ihrer Nähe
    Bischofsgartenstr. 1
    50667 Köln
    16,95 €*
  • Günstigster Preis Online
    Lieferzeit: 5-7 Tage
    16,95 €*
    16,95 € inkl. Versand
* Alle Preise inkl. der jeweils geltenden gesetzlichen Mehrwertsteuer, ggfs. zzgl. Versandkosten.
Alle Angaben ohne Gewähr. Preisänderungen sind in der Zwischenzeit möglich.
Daten vom 14.08.2018 01.25 Uhr

Regionale Angebote für Altmühltal

Online Preisvergleich für Altmühltal

  • Altmühltal
    Lieferzeit: 5-7 Tage
    16,95 €*
    16,95 € inkl. Versand
  • Altmühltal
    Lieferzeit: 1-4 Werktagen
    Versandkostenfrei ab 19,90 €
    16,95 €*
    16,95 € inkl. Versand
  • Altmühltal
    Lieferzeit: 1 bis 4 Werktage
    16,95 €*
    16,95 € inkl. Versand
  • Altmühltal
    Lieferzeit: 5-7 Tage
    16,95 €*
    16,95 € inkl. Versand
  • Altmühltal
    Lieferzeit: 5-7 Tage
    Versandkostenfrei ab 20,00 €
    16,95 €*
    19,95 € inkl. Versand

Altmühltal Daten von Localhood GmbH

Details zum Produkt: Altmühltal

Dr. Martin Röper studierte und promovierte an der Rheinischen Friedrich-Wilhelms-Universität zu Bonn mit Themen über die Solnhofener Fossillagerstätten. Seit dem Jahr 2000 arbeitet er als wissenschaftlicher Leiter und Kurator am Museum Solnhofen. Der Autor einer Reihe von Plattenkalkbüchern gilt als Vater einer differenzierten Betrachtung der Plattenkalke in einem dynamischen Raum-Zeit-Gefüge, auf der die moderne Sichtweise des Solnhofenarchipels fußt. Monika Rothgaenger arbeitet seit 1991 zusammen mit Dr. Martin Röper an der Dokumentation der Ostbayerischen Plattenkalke. Sie hat dabei die Methoden rezentbiologischer Biotoperfassung auf die Plattenkalkgrabungen übertragen. Sie ist Mitautorin mehrerer Plattenkalkbücher.

Zusatzinformation: Altmühltal - Röper, Martin Rothgaenger, Monika

ISBN(s) 9783494014883
Einbandart Einband - flex.(Paperback)
Seitenanzahl 136
Sprache Deutsch
Artikel Typ Physisch
Genre Mathematik/Naturwissenschaften/Technik/Medizin
Kurztitel Röper, Martin: Altmühltal
Warengruppe HC/Ratgeber/Natur/Naturführer
ISBN-10 3494014884
Länge 193 mm
Breite 125 mm
Höhe 10 mm
Gewicht 235 gr
Produkttyp Hardcover, Softcover
Verlag Quelle + Meyer Quelle & Meyer Verlag GmbH & Co.
Untertitel Im Reich der Archaeopteryx

Andere Bücher aus der Kategorie "Bücher"

Andere Bücher von Localhood GmbH

The Shellcoder's Handbook Anley, C: Shellcoder's Handbook
The Shellcoder's Handbook Anley, C: Shellcoder's Handbook
Chris Anley is a founder and director of NGSSoftware, a security software, consultancy, and research company based in London, England. He is actively involved in vulnerability research and has discovered security flaws in a wide variety of platforms including Microsoft Windows, Oracle, SQL Server, IBM DB2, Sybase ASE, MySQL, and PGP. John Heasman is the Director of Research at NGSSoftware. He is a prolific security researcher and has published many security advisories in enterprise level software. He has a particular interest in rootkits and has authored papers on malware persistence via device firmware and the BIOS. He is also a co-author of The Database Hacker's Handbook: Defending Database Servers (Wiley 2005). Felix "FX" Linder leads SABRE Labs GmbH, a Berlin-based professional consulting company specializing in security analysis, system design creation, and verification work. Felix looks back at 18 years of programming and over a decade of computer security consulting for enterprise, carrier, and software vendor clients. This experience allows him to rapidly dive into complex systems and evaluate them from a security and robustness point of view, even in atypical scenarios and on arcane platforms. In his spare time, FX works with his friends from the Phenoelit hacking group on different topics, which have included Cisco IOS, SAP, HP printers, and RIM BlackBerry in the past. Gerardo Richarte has been doing reverse engineering and exploit development for more than 15 years non-stop. In the past 10 years he helped build the technical arm of Core Security Technologies, where he works today. His current duties include developing exploits for Core IMPACT, researching new exploitation techniques and other low-level subjects, helping other exploit writers when things get hairy, and teaching internal and external classes on assembly and exploit writing. As result of his research and as a humble thank you to the community, he has published some technical papers and open source projects, presented in a few conferences, and released part of his training material. He really enjoys solving tough problems and reverse engineering any piece of code that falls in his reach just for the fun of doing it.
Bobby Owsinski's Deconstructed Hits: Modern Pop & Hip-Hop Owsinski, B: Bobby Owsinski's Deconstructed Hits: Modern Pop
Bobby Owsinski's Deconstructed Hits: Modern Pop & Hip-Hop Owsinski, B: Bobby Owsinski's Deconstructed Hits: Modern Pop
You'll never listen to music the same way again! Producer, audio engineer, and author Bobby Owsinski takes you behind-the-scenes of 20 of the biggest modern pop and hip-hop hits of the 21st century. Using a technique refined after years of listening to songs under the microscope of the studio, each song analysis by Bobby describes exactly how the song was constructed and why it was a hit, examining in detail the song form, the arrangement, the sound, and the production. This is a valuable must-have for everyone who loves music, musicians learning about arrangements, producers wanting to learn how hits are constructed, audio engineers analyzing the sounds of the hits, songwriters looking inside a hit's secrets, and fans who love facts and trivia about their favorite artists. Every song analysis has numerous "listen to" moments pointing out small but significant changes in the arrangement or sound that you might not have noticed before. Plus you'll get all the song facts never found all in one place like release date, songwriters, recording studio information, number of units sold, and chart position. Includes: Beautiful (Christina Aguilera) * Born This Way (Lady Gaga) * Call Me Maybe (Carly Rae Jepsen) * Crazy In Love (Beyonce) * Crazy (Gnarls Barkley) * Drop It Like It's Hot (Snoop Dogg) * Firework (Katy Perry) * Get the Party Started (P!nk) * Grenade (Bruno Mars) * I Gotta Feeling (The Black Eyed Peas) * In da Club (50 Cent) * Lights (Ellie Goulding) * Poker Face (Lady Gaga) * Sexy and I Know It (LMFAO) * SexyBack (Justin Timberlake) * Super Bass (Nicki Minaj) * Turn Me On (David Guetta) * Umbrella (Rihanna) * We Are Young (fun.) * Written in the Stars (Tinie Tempah).
An Introduction to Money Laundering Deterrence Cox, D: Introduction to Money Laundering Deterrence
An Introduction to Money Laundering Deterrence Cox, D: Introduction to Money Laundering Deterrence
Every criminal act anywhere that involves obtaining money illegally produces funds which need to be laundered. The IMF estimates that 2-5% of global GDP ($590bn and $1.5 trillion) is laundered every year - $590bn is the equivalent of Spain's yearly output. Globally, regulations have come in which affect certain businesses, especially banks and other financial institutions. These businesses have been required to put in place specific arrangements to prevent and detect money laundering and the criminal activity that underlies it. As money launderers have resorted to more sophisticated ways of disguising the source of their funds, so employees have to be ever more aware of what they are dealing with, and how to deal with it. * At present books on money laundering deterrence tend to focus on the detailed regulations and therefore do not provide much in the form of practical advice and guidance. The books also tend to look at money laundering regulation from a single perspective - say that of the UK. * Legislation requires firms to provide all relevant employees with adequate training on that legislation, and to recognise and deal appropriately with transactions where money laundering is suspected. * This book will look at a series of types of money laundering, explain how they are used and what controls, if any, could be used by an institution to protect itself. * What should make a banker suspicious, how would suspicion appear to a court or regulator, and what will the impact be on controls and reputational risk.