Search alternatives:
"slight" » "sight" (Expand Search)
"slightly" » "sightly" (Expand Search)
"fight" » "eight" (Expand Search), "might" (Expand Search)
"fights" » "eights" (Expand Search), "mights" (Expand Search), "rights" (Expand Search), "lights" (Expand Search)
"fightsssly" » "eightsssly" (Expand Search), "mightsssly" (Expand Search), "rightsssly" (Expand Search), "lightsssly" (Expand Search)
"fright" » "wright" (Expand Search), "bright" (Expand Search), "frights" (Expand Search)
"frightssly" » "wrightssly" (Expand Search), "brightssly" (Expand Search), "frightsly" (Expand Search), "frightsssly" (Expand Search)
"frightsly" » "wrightsly" (Expand Search), "brightsly" (Expand Search), "frights" (Expand Search), "frightssly" (Expand Search)
"frightsssly" » "wrightsssly" (Expand Search), "brightsssly" (Expand Search), "frightssly" (Expand Search), "frightsly" (Expand Search), "frightssssly" (Expand Search)
"wrights" » "rights" (Expand Search), "wright" (Expand Search), "weights" (Expand Search), "wrightss" (Expand Search)
"wrightssly" » "rightssly" (Expand Search), "wrightsly" (Expand Search), "weightssly" (Expand Search), "wrightsssly" (Expand Search)
"wrightsly" » "rightsly" (Expand Search), "wrightly" (Expand Search), "weightsly" (Expand Search), "wrights" (Expand Search), "wrightssly" (Expand Search)
"eights" » "weights" (Expand Search), "rights" (Expand Search), "eight" (Expand Search)
"heights" » "hweights" (Expand Search), "hrights" (Expand Search), "height" (Expand Search)
"night" » "eight" (Expand Search)
"weight" » "eight" (Expand Search), "wright" (Expand Search)
"rightss" » "rights" (Expand Search), "rightsss" (Expand Search)
"rightsss" » "rightss" (Expand Search), "rights" (Expand Search), "rightssss" (Expand Search)
"rightssly" » "rightsly" (Expand Search), "rightsssly" (Expand Search)
"rightsssly" » "rightssly" (Expand Search), "rightsly" (Expand Search), "rightssssly" (Expand Search)
"rightsly" » "rights" (Expand Search), "rightssly" (Expand Search)
"right" » "rights" (Expand Search)
Showing 142,381 - 142,400 results of 170,798 for search '(("klight" OR ((((("slight" OR "fight") OR "slightly") OR "flight") OR ((("fright" OR (("wrights" OR ("fights" OR "eights")) OR ("fights" OR "eights"))) OR "night") OR ((("wrights" OR ("weight" OR "weight")) OR ("rightss" OR "rightsss")) OR "heights"))) OR ("mightly" OR (((("frightssly" OR "wrightssly") OR ("frightsly" OR (("wrightsly" OR "wrightsly") OR "rightsly"))) OR ("frightsssly" OR ("fightsssly" OR "lightsssly"))) OR ("rightssly" OR "rightsssly"))))) OR ("right" OR "light"))', query time: 1.92s Refine Results
  1. 142381

    The Palgrave International Handbook of Women and Outdoor Learning

    Cham : Springer International Publishing : Imprint: Palgrave Macmillan, 2018
    Table of Contents: “…Tourist and Sport Reform Dress, Friluftsliv, and Women’s Right to Vote: Norway 1880s-1913; Kirsti Pederson Gurholt -- Chapter 9. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  2. 142382

    The global economy in turbulent times by Lin, See Yan

    Singapore : Wiley, 2015
    Table of Contents: “…-- The Third Plenum Reforms Are Well Received, but the New Deal Flashes Danger Signals -- China: Multiple Policy Dilemmas -- China: Rebalancing Growth with Reform and Moving Up to the Next Level -- India: The Outlook Dims -- "A Passage to India": The Outlook Remains Dire -- Corporate Governance and Management -- On Corporate Governance and Doing It Right -- The CG Blueprint 2011: "Let a Hundred Flowers Bloom" -- Creative Destruction: "Kodak Moment" No More -- The F & N Saga -- On Global Gaming, Aussie, the SGX--ASX Merger.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Access E-Book
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  3. 142383

    Let's get IoT-fied! : 30 IoT projects for all levels by Juluru, Anudeep, Vasudevan, Shriram K., Murugesh, T. S.

    Boca Raton, FL : CRC Press, 2023
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  4. 142384
  5. 142385

    SAP Hardware Solutions : Servers, Storage, and Networks for MySAP. Com. by Missbach, Michael, Hoffmann, Uwe M.

    E Rutherford : Prentice Hall PTR, 2000
    3rd ed.
    Format: Electronic eBook
    Full text (Wentworth users only)
  6. 142386

    Memoirs of the Duke of Rovigo (M. Savary) : illustrative of the history of the Emperor Napoleon. Volume II, parts I and II by Savary, Anne-Jean-Marie-René, duc de Rovigo, 1774-1833

    [San Francisco] : Pickle Partners Publishing, 2013
    Table of Contents: “…. -- The Russian army crosses to the right bank of the river-The Emperor scarcely credits this imprudence-Our columns debouch-Skilful movement of General Dupont-The action becomes general-Battle of Friedland-The Russians are defeated. -- CHAPTER VII. -- News of the taking of Königsberg received by the Emperor-The author is appointed governor of that place-Resources of every kind-Great number of wounded returning to their corps-System and management of the, hospitals- The Russians ask an armistice-Interview at Tilsit. -- CHAPTER VIII.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  7. 142387

    Mobile magic : the saatchi and saatchi guide to mobile marketing and design by Eslinger, Tom

    Hoboken : Wiley, 2014
    First edition.
    Table of Contents: “…Section 2: Understanding the EssentialsChapter 4: The Four Keys to Mobile Marketing Success; Mobile; Intimate; Social; Transactional; The Three Ps; Chapter 5: The Sweet Spot: Search and Social; Search; Just What I Was Looking For; Get Your Site Right; Searching for the Answers; Social; Joining, Having and Starting Conversations; More Isn't Always Merrier; The Sweet Spot; Dashboard Tools for Monitoring and Distribution: The Non-Mobile Part of Mobile; Chapter 6: Marketer, Know Thyself (And Thy Audience)!…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  8. 142388
  9. 142389
  10. 142390

    Developmental care of newborns & infants : a guide for health professionals

    St. Louis, MO : Mosby, 2004
    Table of Contents: “…Pressler, Carol Spruill Turnage-Carrier, Carole Kenner -- Frontier of Molecular Biology -- Developmental Care as a Focal Point -- Contemporary Intensive Care and Its Relationship to Infant Outcomes -- What Is Currently Known about the Outcomes of Hospitalized Preterm Neonates -- Environmental Neonatology as a Discipline in Its Own Right -- Family-Centered Care -- Economics of Health Care -- Scope of Practice -- Developmental Care -- Intensive Care Nursery Design Standards and Developmental Care -- The Future of Developmental Care -- Individualized Care: Actions for the Individualized Staff Member / Diane D. …”
    Format: Book


  11. 142391

    Proteomics for food authentication

    Boca Raton : CRC Press, 2020
    Format: Electronic eBook
    Full text (WIT users only)
  12. 142392

    Third world health : hostage to first world health by MacDonald, Theodore H. (Theodore Harney), 1933-

    Oxford ; Seattle : Radcliffe Pub., 2005
    Table of Contents: “…-- Organising for transnational government -- References -- Appendices -- A: Regression line explained -- B: Compound interest formula explained -- C: Protecting breastfeeding from unethical marketing -- D: Nutrition league table -- E: Peru's letter of intent -- F: New framework and guidelines enshrining a fundamental human right to the highest attainable standard of health -- G: State of the IBFAN code country by country -- H: WHO HFA (2000) targets for equity in health -- Index.…”
    Format: Book


  13. 142393

    Bergman's comprehensive encyclopedia of human anatomic variation.

    Malden, MA : Wiley-Blackwell, 2016
    Table of Contents: “…Shane Tubbs 75 Thoracic duct and right lymphatic duct; Young-Bin Song 76 Lymphatics lower limb; Sadakazu Aiso, David W. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  14. 142394

    The Works and Times of Johan Huizinga (1872-1945) Writing History in the Age of Collapse by Rydin, Thor

    Table of Contents: “…(A) Jan van Eyck's The Arnolfini Wedding (1434) is shown. On the right, two images show geometrical features of primary importance to the painting's art historical status. …”
    Format: Electronic eBook
    Full text (Open Access)
  15. 142395

    Discourse, identity and legitimacy : self and other in representations of Iran's nuclear programme by KhosraviNik, Majid

    Amsterdam ; Philadelphia : John Benjamins Publishing Company, 2015
    Table of Contents: “…8.1 Discourse topics analysis -- 8.2 Textual analysis: a short example -- 8.3 Referential strategy -- 8.3.1 Referential strategy: Self (the West) -- 8.3.2 Referential strategy: Other (Iran) -- 8.3.3 Referential strategy: Iran's nuclear programme -- 8.4 Predicational strategy -- 8.4.1 Predicational strategy: Self -- 8.4.2 Predicational strategy: Other -- 8.5 Argumentative strategy -- 8.5.1 Topos of threat: we are right because they are (constructed as) a threat -- 8.6 Presupposition and shared knowledge -- 8.6.1 Presupposition triggers -- 9. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  16. 142396

    Clinical and basic oculomotor research : in honor of David S. Zee

    New York : New York Academy of Sciences, 2005
    Table of Contents: “….] -- Role of the posterior parietal cortex in the initiation of saccades and vergence: right/left functional asymmetry / by Zö Kapoula ... …”
    Format: Book


  17. 142397

    Python Machine Learning By Example. by Liu, Yuxi (Data scientist)

    Birmingham, UNKNOWN : Packt Publishing, 2017
    Table of Contents: “…Chapter 8: Best Practices -- Machine learning workflow -- Best practices in the data preparation stage -- Best practice 1 -- completely understand the project goal -- Best practice 2 -- collect all fields that are relevant -- Best practice 3 -- maintain consistency of field values -- Best practice 4 -- deal with missing data -- Best practices in the training sets generation stage -- Best practice 5 -- determine categorical features with numerical values -- Best practice 6 -- decide on whether or not to encode categorical features -- Best practice 7 -- decide on whether or not to select features and if so, how -- Best practice 8 -- decide on whether or not to reduce dimensionality and if so how -- Best practice 9 -- decide on whether or not to scale features -- Best practice 10 -- perform feature engineering with domain expertise -- Best practice 11 -- perform feature engineering without domain expertise -- Best practice 12 -- document how each feature is generated -- Best practices in the model training, evaluation, and selection stage -- Best practice 13 -- choose the right algorithm(s) to start with -- Naive Bayes -- Logistic regression -- SVM -- Random forest (or decision tree) -- Neural networks -- Best practice 14 -- reduce overfitting -- Best practice 15 -- diagnose overfitting and underfitting -- Best practices in the deployment and monitoring stage -- Best practice 16 -- save, load, and reuse models -- Best practice 17 -- monitor model performance -- Best practice 18 -- update models regularly -- Summary -- Index.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  18. 142398
  19. 142399

    Encyclopedia of Biometrics

    Boston, MA : Springer US : Imprint: Springer, 2015
    Table of Contents: “…Access Control, Logical -- Access Control, Physical -- Age Estimation -- Anatomy of Friction Ridge Skin -- Anatomy of the Hand -- And-Or Graph Face Model and Its Applications in Artistic Sketching and Aging Simulation -- ANSI/NIST-ITL Standard: Data Format for the Interchange of Fingerprint, Facial, and Other Biometric Information -- Anti-spoofing, Evaluation Methodologies -- Anti-spoofing, Face -- Anti-spoofing, Face Databases -- Anti-spoofing, Fingerprint (Fake Fingers) -- Anti-spoofing, Fingerprint (Hardware and Software) -- Anti-spoofing, Fingerprint Databases -- Anti-spoofing, Iris -- Anti-spoofing, Iris Databases -- Anti-spoofing, Multimodal -- Anti-spoofing,Voice -- Anti-spoofing, Voice Conversion -- Anti-spoofing, Voice Databases -- Automatic Analysis of Facial Expressions -- Automatic Classification of Left/Right Iris Image -- Background Checks -- Back-of-Hand Vascular Recognition -- BioAPI, Standardization -- Biometric Algorithms -- Biometric and User Data, Binding of -- Biometric Applications, Overview -- Biometric Data Interchange Format Standards -- Biometric Identity Assurance Services -- Biometric Interfaces -- Biometric Sample Acquisition -- Biometric Sample Quality -- Biometric Sample Quality, Standardization -- Biometric Sample Synthesis -- Biometric Security Standards -- Biometric Sensor and Device, Overview -- Biometric System Design, Overview -- Biometric System-on-Card -- Biometric System-on-Card, Standardization -- Biometric Systems, Agent-Based -- Biometric Technical Interface, Standardization -- Biometric Template Binarization -- Biometric Verification/Identification/Authentication/Recognition: The Terminology -- Biometric Vocabulary Standardization -- Biometric Vulnerabilities, Overview -- Biometric Zoo Menagerie -- Biometrics on Mobile Devices -- Biometrics, Overview -- Cancelable Biometrics -- Fingerprint Databases for Technology Evaluation, Characterization and Measurement of Difficulty -- Cohort-Based Score Normalization -- Common Biometric Exchange Formats Framework Standardization -- Comparative Anatomy of the Face -- Configuration Issues, System Design -- Deformable Models -- Dental Biometrics -- Digitizing Tablet -- DNA Data Format Standardization -- Ear Biometrics -- Ear Biometrics, 3D -- Earprints, Forensic Evidence of -- Ear Recognition, Physical Analogies -- EEG Biometrics -- Embedded Systems -- Encryption, Biometric -- Ensemble Learning -- Environmental Testing Methodology of Biometric System Performance, Standardization -- Ergonomic Design for Biometric Systems -- Eye Features and Anatomy -- Face Alignment -- Face Databases and Evaluation -- Face Detection -- Face Device -- Face Misalignment Problem -- Face Pose Analysis -- Face Recognition Standards -- Face Recognition, 3D-Based -- Face Recognition, Component-Based -- Face Recognition, Geometric vs. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  20. 142400

    Mastering Kali Linux Wireless Pentesting. by Ram, Jilumudi Raghu, Sak, Brian

    Birmingham : Packt Publishing, Limited 2016
    Table of Contents: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Wireless Penetration Testing Fundamentals -- Wireless communication -- Wireless standards -- The 2.4 GHz spectrum -- The 5 GHz spectrum -- Choosing the right equipment -- Supported wireless modes -- Wireless adapters -- Ralink RT3070 -- Atheros AR9271 -- Ralink RT3572 -- Antennas -- Omnidirectional antennas -- Patch antennas -- Yagi antennas -- Kali Linux for the Wireless Pentester -- Downloading Virtual Box -- Installing Virtual Box -- Kali Linux deployment -- Mapping the wireless adapter into Kali -- Summary -- Chapter 2: Wireless Network Scanning -- Wireless network discovery -- 802.11 network terminology -- 802.11 configuration modes -- 802.11 Frames -- Management Frame -- Control frames -- Data frames -- The scanning phase -- Passive scanning -- Active scanning -- Tools of the trade -- Airodump-ng -- Adding a location to Airodump-ng with GPS -- Visually displaying relationships with Airgraph-ng -- Discovering Client Probes with Hoover -- WPS discovery with Wash -- Kismet -- Wireshark -- Summary -- Chapter 3: Exploiting Wireless Devices -- Attacking the firmware -- Authentication bypass -- CVE-2013-7282 -- CVE-2013-6026 -- CVE-2015-7755 -- Cross-Site Request Forgery -- CVE-2014-5437 -- CVE-2014-8654 -- CVE-2013-2645 -- Remote code execution -- CVE-2014-9134 -- Command injection -- CVE-2008-1331 -- Denial of Service -- OSVDB-102605 -- CVE-2009-3836 -- Information disclosure -- CVE-2014-6621 -- CVE-2014-6622 -- CVE-2015-0554 -- Attacking the services -- Attacking Telnet -- Attacking SSH -- Attacking SNMP -- CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure -- CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure -- Attacking SNMP -- Attacking UPnP -- Discovery.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)