Showing 128,501 - 128,520 results of 140,986 for search '(("klight" OR (((("slight" OR "slightly") OR "flight") OR ((("fright" OR "frightss") OR "fight") OR ((("wrightss" OR "wrightsss") OR "rightss") OR ("weight" OR "eight")))) OR ("flightly" OR (("wrightsssly" OR "rightssly") OR "weightssly")))) OR ("right" OR "light"))', query time: 1.20s Refine Results
  1. 128501

    The Continuing challenge : the past and the future of Brown v. Board of Education : a symposium.

    Evanston, Ill. : Published for Notre Dame Center for Civil Rights by Integrated Education Associates, 1975
    Format: Book


  2. 128502

    Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies

    Hoboken, NJ : Scrivener Publishing/Wiley, 2019
    First edition.
    Table of Contents: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  3. 128503

    Inside the EU Code of Conduct Group. by Nouwen, Martijn F.

    Amsterdam : IBFD Publications USA, Incorporated, 2021
    Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
    Format: eBook
    Full text (Emerson users only)
  4. 128504

    Database processing : fundamentals, design, and implementation by Kroenke, David M., 1946-

    Boston : Pearson, 2016
    14th edition.
    Table of Contents: “…Note continued: Changing Relationship Cardinalities -- Changing Minimum Cardinalities -- Changing Maximum Cardinalities -- Adding and Deleting Tables and Relationships -- Forward Engineering -- Summary -- Key Terms -- Review Questions -- Project Questions -- Case Questions -- The Queen Anne Curiosity Shop -- Morgan Importing -- ch. 9 Managing Multiuser Databases -- Chapter Objectives -- The Importance of Working with an Installed DBMS Product -- Database Administration -- Managing the Database Structure -- Concurrency Control -- The Need for Atomic Transactions -- Resource Locking -- Optimistic Versus Pessimistic Locking -- SQL Transaction Control Language and Declaring Lock Characteristics -- Implicit and Explicit COMMIT TRANSACTION -- Consistent Transactions -- Transaction Isolation Level -- SQL Cursors -- Database Security -- Processing Rights and Responsibilities -- DBMS Security -- DBMS Security Guidelines -- Application Security -- The SQL Injection Attack…”
    Format: Book

    This item is not available through FLO. Please contact your home library for further assistance.
  5. 128505

    Inside the EU Code of Conduct Group by Nouwen, Martijn F.

    Amsterdam : IBFD Publications USA, Incorporated, 2021
    Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
    Format: Electronic eBook
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  6. 128506

    Principles of sustainable energy systems by Kutscher, Charles F., Milford, Jana B., Kreith, Frank

    Boca Raton, FL : CRC Press, 2019
    Third edition.
    Table of Contents: “…Electric Power System -- 5.2 Electrical Transmission -- 5.3 The Electric Grid and Electricity Markets -- 5.3.1 Rate Structures -- 5.3.2 Electricity Markets -- 5.3.2.1 Energy Market -- 5.3.2.2 Capacity Market -- 5.3.2.3 Ancillary Services Market -- 5.3.2.4 Financial Transmission Rights Market -- 5.4 Grid Operations -- 5.5 Integration of Variable Renewable Energy into the Grid.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  7. 128507

    The crossing by Paulsen, Gary

    New York : Orchard Books, 1987
    Format: Book


  8. 128508

    The haunting at Stratton Falls by Seabrooke, Brenda

    New York : Dutton Children's Books, 2000
    First edition.
    Format: Book


  9. 128509

    Dealing with dragons by Wrede, Patricia C., 1953-

    San Diego : Jane Yolen Books, 1990
    First edition.
    Format: Book

    This item is not available through FLO. Please contact your home library for further assistance.
  10. 128510

    The secret war by Johnson, Brian, 1925-

    New York : Methuen, 1978
    Format: Book


  11. 128511

    Beyond the burning time by Lasky, Kathryn

    New York : Blue Sky Press, 1994
    Format: Book


  12. 128512

    Wolf-speaker by Pierce, Tamora

    New York : Toronto : New York : Atheneum ; Maxwell Macmillan Canada ; Maxwell Macmillan International, 1994
    First edition.
    Format: Book


  13. 128513

    Orangutans: Photographing Animal Communities.

    [San Francisco, California, USA] : Kanopy Streaming,; The Great Courses, 2018; 2016
    Format: Electronic Video
    Streaming video (Wentworth users only)
  14. 128514

    The Cigarette Surfboard.

    [San Francisco, California, USA] : Lightbeam,; Kanopy Streaming, 2020; 2023
    Format: Electronic Video
    Streaming video (Wentworth users only)
  15. 128515

    The Road to War.

    [San Francisco, California, USA] : Kanopy Streaming,; Intelecom Learning, 2018; 2004
    Format: Electronic Video
    Streaming video (Wentworth users only)
  16. 128516

    American Revolution: The Impossible War

    [San Francisco, California, USA] : Kanopy Streaming, 2015
    Format: Electronic Video
    Streaming video (Wentworth users only)
  17. 128517

    The one-eyed giant by Osborne, Mary Pope

    New York : Hyperion Books for Children, 2002
    First edition.
    Format: Book


  18. 128518

    The EU and counter-terrorism politics, polity and policies after 9/11 by Argomaniz, Javier

    London ; New York : Routledge, 2011
    Format: Electronic eBook
    Access E-Book
  19. 128519

    Zombie Tag by Moskowitz, Hannah

    New York : Roaring Brook Press, 2011
    First edition.
    Format: Book


  20. 128520

    The death of Mr. Lazarescu.

    [San Francisco, California, USA] : Kanopy Streaming, 2014
    Format: Electronic Video
    Streaming video (Wentworth users only)