Valla, Lorenzo, 1407-1457. Encomion s. Thomae : Christianity, latinity, and culture : two studies on Lorenzo Valla / by Salvatore I. Camporeale ; translated by Patrick Baker ; edited by Patrick Baker, Christopher S. Celenza ; with Lorenzo Valla's Encomium of Saint Thomas / edited and translated by Patrick Baker
2013
1
Encomium Emmae Reginae. : England in Europe: English Royal Women and Literary Patronage c1000-1150
Encopresis. : The management of disorders of bladder and bowel control in childhood / Alexander von Gontard, Tryggve Nevéus
2006
1
Encopresis -- Diagnosis : Diagnosing mental disorders : DSM-5 and the ICD-10. Elimination disorders / produced by Classroom Productions, INC. ; directed by Sean Harrigan
Here are entered works on voluntary or involuntary defecation in abnormal places. Works on involuntary defecation as a symptom of disease are entered under Fecal incontinence
1
Encopresis -- Treatment. : A guide to encopresis : a guide to the treatment of encopresis / written by Christina Blackwell
A group of people who meet in an unstructured setting to learn about themselves, interpersonal relationships, and group processes and about larger social systems
Encouragement -- Research -- Case studies. : In-depth participant interviews : studying social support among obese and overweight young adults attempting to lose weight / Meara H. Faw
2017
1
Encratites. : Thomas at the crossroads : essays on the Gospel of Thomas / edited by Risto Uro
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data