Search alternatives:
"slight" » "sight" (Expand Search)
"slightly" » "sightly" (Expand Search)
"fright" » "wright" (Expand Search), "bright" (Expand Search), "frights" (Expand Search)
"frightss" » "wrightss" (Expand Search), "brightss" (Expand Search), "rights" (Expand Search), "fights" (Expand Search), "frights" (Expand Search), "frightsss" (Expand Search)
"fight" » "night" (Expand Search), "might" (Expand Search)
"wrightss" » "rights" (Expand Search), "wright" (Expand Search), "weights" (Expand Search), "wrights" (Expand Search), "wrightsss" (Expand Search)
"wrightsss" » "rightss" (Expand Search), "wrights" (Expand Search), "weightss" (Expand Search), "wrightss" (Expand Search), "wrightssss" (Expand Search)
"wrightssss" » "rightsss" (Expand Search), "wrightss" (Expand Search), "weightsss" (Expand Search), "wrightsss" (Expand Search), "wrightsssss" (Expand Search)
"wrightsssly" » "rightssly" (Expand Search), "wrightsly" (Expand Search), "weightssly" (Expand Search), "wrightssly" (Expand Search), "wrightssssly" (Expand Search)
"rightss" » "rights" (Expand Search), "rightsss" (Expand Search)
"weight" » "wright" (Expand Search)
"right" » "rights" (Expand Search)
"slight" » "sight" (Expand Search)
"slightly" » "sightly" (Expand Search)
"fright" » "wright" (Expand Search), "bright" (Expand Search), "frights" (Expand Search)
"frightss" » "wrightss" (Expand Search), "brightss" (Expand Search), "rights" (Expand Search), "fights" (Expand Search), "frights" (Expand Search), "frightsss" (Expand Search)
"fight" » "night" (Expand Search), "might" (Expand Search)
"wrightss" » "rights" (Expand Search), "wright" (Expand Search), "weights" (Expand Search), "wrights" (Expand Search), "wrightsss" (Expand Search)
"wrightsss" » "rightss" (Expand Search), "wrights" (Expand Search), "weightss" (Expand Search), "wrightss" (Expand Search), "wrightssss" (Expand Search)
"wrightssss" » "rightsss" (Expand Search), "wrightss" (Expand Search), "weightsss" (Expand Search), "wrightsss" (Expand Search), "wrightsssss" (Expand Search)
"wrightsssly" » "rightssly" (Expand Search), "wrightsly" (Expand Search), "weightssly" (Expand Search), "wrightssly" (Expand Search), "wrightssssly" (Expand Search)
"rightss" » "rights" (Expand Search), "rightsss" (Expand Search)
"weight" » "wright" (Expand Search)
"right" » "rights" (Expand Search)
-
128501
The Continuing challenge : the past and the future of Brown v. Board of Education : a symposium.
Evanston, Ill. : Published for Notre Dame Center for Civil Rights by Integrated Education Associates, 1975Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128502
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
Hoboken, NJ : Scrivener Publishing/Wiley, 2019Table of Contents: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution.…”
First edition.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
128503
Inside the EU Code of Conduct Group.
Amsterdam : IBFD Publications USA, Incorporated, 2021Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
Format: eBookFull text (Emerson users only)
-
128504
Database processing : fundamentals, design, and implementation
Boston : Pearson, 2016Table of Contents: “…Note continued: Changing Relationship Cardinalities -- Changing Minimum Cardinalities -- Changing Maximum Cardinalities -- Adding and Deleting Tables and Relationships -- Forward Engineering -- Summary -- Key Terms -- Review Questions -- Project Questions -- Case Questions -- The Queen Anne Curiosity Shop -- Morgan Importing -- ch. 9 Managing Multiuser Databases -- Chapter Objectives -- The Importance of Working with an Installed DBMS Product -- Database Administration -- Managing the Database Structure -- Concurrency Control -- The Need for Atomic Transactions -- Resource Locking -- Optimistic Versus Pessimistic Locking -- SQL Transaction Control Language and Declaring Lock Characteristics -- Implicit and Explicit COMMIT TRANSACTION -- Consistent Transactions -- Transaction Isolation Level -- SQL Cursors -- Database Security -- Processing Rights and Responsibilities -- DBMS Security -- DBMS Security Guidelines -- Application Security -- The SQL Injection Attack…”
14th edition.
Format: Book
This item is not available through FLO. Please contact your home library for further assistance. -
128505
Inside the EU Code of Conduct Group
Amsterdam : IBFD Publications USA, Incorporated, 2021Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
Format: Electronic eBookFull text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
128506
Principles of sustainable energy systems
Boca Raton, FL : CRC Press, 2019Table of Contents: “…Electric Power System -- 5.2 Electrical Transmission -- 5.3 The Electric Grid and Electricity Markets -- 5.3.1 Rate Structures -- 5.3.2 Electricity Markets -- 5.3.2.1 Energy Market -- 5.3.2.2 Capacity Market -- 5.3.2.3 Ancillary Services Market -- 5.3.2.4 Financial Transmission Rights Market -- 5.4 Grid Operations -- 5.5 Integration of Variable Renewable Energy into the Grid.…”
Third edition.
Format: Electronic eBookFull text (Wentworth users only)
-
128507
The crossing
New York : Orchard Books, 1987Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128508
The haunting at Stratton Falls
New York : Dutton Children's Books, 2000
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128509
Dealing with dragons
San Diego : Jane Yolen Books, 1990
First edition.Format: Book
This item is not available through FLO. Please contact your home library for further assistance. -
128510
The secret war
New York : Methuen, 1978Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128511
Beyond the burning time
New York : Blue Sky Press, 1994Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128512
Wolf-speaker
New York : Toronto : New York : Atheneum ; Maxwell Macmillan Canada ; Maxwell Macmillan International, 1994
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128513
Orangutans: Photographing Animal Communities.
[San Francisco, California, USA] : Kanopy Streaming,; The Great Courses, 2018; 2016Format: Electronic VideoStreaming video (Wentworth users only)
-
128514
The Cigarette Surfboard.
[San Francisco, California, USA] : Lightbeam,; Kanopy Streaming, 2020; 2023Format: Electronic VideoStreaming video (Wentworth users only)
-
128515
The Road to War.
[San Francisco, California, USA] : Kanopy Streaming,; Intelecom Learning, 2018; 2004Format: Electronic VideoStreaming video (Wentworth users only)
-
128516
American Revolution: The Impossible War
[San Francisco, California, USA] : Kanopy Streaming, 2015Format: Electronic VideoStreaming video (Wentworth users only)
-
128517
The one-eyed giant
New York : Hyperion Books for Children, 2002
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128518
The EU and counter-terrorism politics, polity and policies after 9/11
London ; New York : Routledge, 2011Format: Electronic eBookAccess E-Book
-
128519
Zombie Tag
New York : Roaring Brook Press, 2011
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
128520
The death of Mr. Lazarescu.
[San Francisco, California, USA] : Kanopy Streaming, 2014Format: Electronic VideoStreaming video (Wentworth users only)