Search alternatives:
"slight" » "sight" (Expand Search)
"slightly" » "sightly" (Expand Search)
"fight" » "eight" (Expand Search), "might" (Expand Search)
"fights" » "eights" (Expand Search), "mights" (Expand Search), "rights" (Expand Search), "lights" (Expand Search)
"fightsssly" » "eightsssly" (Expand Search), "mightsssly" (Expand Search), "rightsssly" (Expand Search), "lightsssly" (Expand Search)
"fright" » "wright" (Expand Search), "bright" (Expand Search), "frights" (Expand Search)
"frightssly" » "wrightssly" (Expand Search), "brightssly" (Expand Search), "frightsly" (Expand Search), "frightsssly" (Expand Search)
"frightsly" » "wrightsly" (Expand Search), "brightsly" (Expand Search), "frights" (Expand Search), "frightssly" (Expand Search)
"frightsssly" » "wrightsssly" (Expand Search), "brightsssly" (Expand Search), "frightssly" (Expand Search), "frightsly" (Expand Search), "frightssssly" (Expand Search)
"wrights" » "rights" (Expand Search), "wright" (Expand Search), "weights" (Expand Search), "wrightss" (Expand Search)
"wrightssly" » "rightssly" (Expand Search), "wrightsly" (Expand Search), "weightssly" (Expand Search), "wrightsssly" (Expand Search)
"wrightsly" » "rightsly" (Expand Search), "wrightly" (Expand Search), "weightsly" (Expand Search), "wrights" (Expand Search), "wrightssly" (Expand Search)
"eights" » "weights" (Expand Search), "rights" (Expand Search), "eight" (Expand Search)
"heights" » "hweights" (Expand Search), "hrights" (Expand Search), "height" (Expand Search)
"night" » "eight" (Expand Search)
"weight" » "eight" (Expand Search), "wright" (Expand Search)
"rightss" » "rights" (Expand Search), "rightsss" (Expand Search)
"rightsss" » "rightss" (Expand Search), "rights" (Expand Search), "rightssss" (Expand Search)
"rightssly" » "rightsly" (Expand Search), "rightsssly" (Expand Search)
"rightsssly" » "rightssly" (Expand Search), "rightsly" (Expand Search), "rightssssly" (Expand Search)
"rightsly" » "rights" (Expand Search), "rightssly" (Expand Search)
"right" » "rights" (Expand Search)
"slight" » "sight" (Expand Search)
"slightly" » "sightly" (Expand Search)
"fight" » "eight" (Expand Search), "might" (Expand Search)
"fights" » "eights" (Expand Search), "mights" (Expand Search), "rights" (Expand Search), "lights" (Expand Search)
"fightsssly" » "eightsssly" (Expand Search), "mightsssly" (Expand Search), "rightsssly" (Expand Search), "lightsssly" (Expand Search)
"fright" » "wright" (Expand Search), "bright" (Expand Search), "frights" (Expand Search)
"frightssly" » "wrightssly" (Expand Search), "brightssly" (Expand Search), "frightsly" (Expand Search), "frightsssly" (Expand Search)
"frightsly" » "wrightsly" (Expand Search), "brightsly" (Expand Search), "frights" (Expand Search), "frightssly" (Expand Search)
"frightsssly" » "wrightsssly" (Expand Search), "brightsssly" (Expand Search), "frightssly" (Expand Search), "frightsly" (Expand Search), "frightssssly" (Expand Search)
"wrights" » "rights" (Expand Search), "wright" (Expand Search), "weights" (Expand Search), "wrightss" (Expand Search)
"wrightssly" » "rightssly" (Expand Search), "wrightsly" (Expand Search), "weightssly" (Expand Search), "wrightsssly" (Expand Search)
"wrightsly" » "rightsly" (Expand Search), "wrightly" (Expand Search), "weightsly" (Expand Search), "wrights" (Expand Search), "wrightssly" (Expand Search)
"eights" » "weights" (Expand Search), "rights" (Expand Search), "eight" (Expand Search)
"heights" » "hweights" (Expand Search), "hrights" (Expand Search), "height" (Expand Search)
"night" » "eight" (Expand Search)
"weight" » "eight" (Expand Search), "wright" (Expand Search)
"rightss" » "rights" (Expand Search), "rightsss" (Expand Search)
"rightsss" » "rightss" (Expand Search), "rights" (Expand Search), "rightssss" (Expand Search)
"rightssly" » "rightsly" (Expand Search), "rightsssly" (Expand Search)
"rightsssly" » "rightssly" (Expand Search), "rightsly" (Expand Search), "rightssssly" (Expand Search)
"rightsly" » "rights" (Expand Search), "rightssly" (Expand Search)
"right" » "rights" (Expand Search)
-
142381
The Palgrave International Handbook of Women and Outdoor Learning
Cham : Springer International Publishing : Imprint: Palgrave Macmillan, 2018Table of Contents: “…Tourist and Sport Reform Dress, Friluftsliv, and Women’s Right to Vote: Norway 1880s-1913; Kirsti Pederson Gurholt -- Chapter 9. …”
Format: Electronic eBookFull text (Wentworth users only)
-
142382
The global economy in turbulent times
Singapore : Wiley, 2015Table of Contents: “…-- The Third Plenum Reforms Are Well Received, but the New Deal Flashes Danger Signals -- China: Multiple Policy Dilemmas -- China: Rebalancing Growth with Reform and Moving Up to the Next Level -- India: The Outlook Dims -- "A Passage to India": The Outlook Remains Dire -- Corporate Governance and Management -- On Corporate Governance and Doing It Right -- The CG Blueprint 2011: "Let a Hundred Flowers Bloom" -- Creative Destruction: "Kodak Moment" No More -- The F & N Saga -- On Global Gaming, Aussie, the SGX--ASX Merger.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book
Full text (Wentworth users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
142383
Let's get IoT-fied! : 30 IoT projects for all levels
Boca Raton, FL : CRC Press, 2023
First edition.Format: Electronic eBookFull text (WIT users only)
-
142384
Geotechnical engineering calculations and rules of thumb
Oxford, UK : Butterworth-Heinemann is an imprint of Elsevier, 2015
Second edition.Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142385
SAP Hardware Solutions : Servers, Storage, and Networks for MySAP. Com.
E Rutherford : Prentice Hall PTR, 2000
3rd ed.Format: Electronic eBookFull text (Wentworth users only)
-
142386
Memoirs of the Duke of Rovigo (M. Savary) : illustrative of the history of the Emperor Napoleon. Volume II, parts I and II
[San Francisco] : Pickle Partners Publishing, 2013Table of Contents: “…. -- The Russian army crosses to the right bank of the river-The Emperor scarcely credits this imprudence-Our columns debouch-Skilful movement of General Dupont-The action becomes general-Battle of Friedland-The Russians are defeated. -- CHAPTER VII. -- News of the taking of Königsberg received by the Emperor-The author is appointed governor of that place-Resources of every kind-Great number of wounded returning to their corps-System and management of the, hospitals- The Russians ask an armistice-Interview at Tilsit. -- CHAPTER VIII.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142387
Mobile magic : the saatchi and saatchi guide to mobile marketing and design
Hoboken : Wiley, 2014Table of Contents: “…Section 2: Understanding the EssentialsChapter 4: The Four Keys to Mobile Marketing Success; Mobile; Intimate; Social; Transactional; The Three Ps; Chapter 5: The Sweet Spot: Search and Social; Search; Just What I Was Looking For; Get Your Site Right; Searching for the Answers; Social; Joining, Having and Starting Conversations; More Isn't Always Merrier; The Sweet Spot; Dashboard Tools for Monitoring and Distribution: The Non-Mobile Part of Mobile; Chapter 6: Marketer, Know Thyself (And Thy Audience)!…”
First edition.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
142388
Learning Angular for .NET Developers.
Birmingham : Packt Publishing, 2017Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142389
Web Development with Django Cookbook - Second Edition.
Birmingham : Packt Publishing, Limited 2016
2nd ed.Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
142390
Developmental care of newborns & infants : a guide for health professionals
St. Louis, MO : Mosby, 2004Table of Contents: “…Pressler, Carol Spruill Turnage-Carrier, Carole Kenner -- Frontier of Molecular Biology -- Developmental Care as a Focal Point -- Contemporary Intensive Care and Its Relationship to Infant Outcomes -- What Is Currently Known about the Outcomes of Hospitalized Preterm Neonates -- Environmental Neonatology as a Discipline in Its Own Right -- Family-Centered Care -- Economics of Health Care -- Scope of Practice -- Developmental Care -- Intensive Care Nursery Design Standards and Developmental Care -- The Future of Developmental Care -- Individualized Care: Actions for the Individualized Staff Member / Diane D. …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
142391
Proteomics for food authentication
Boca Raton : CRC Press, 2020Format: Electronic eBookFull text (WIT users only)
-
142392
Third world health : hostage to first world health
Oxford ; Seattle : Radcliffe Pub., 2005Table of Contents: “…-- Organising for transnational government -- References -- Appendices -- A: Regression line explained -- B: Compound interest formula explained -- C: Protecting breastfeeding from unethical marketing -- D: Nutrition league table -- E: Peru's letter of intent -- F: New framework and guidelines enshrining a fundamental human right to the highest attainable standard of health -- G: State of the IBFAN code country by country -- H: WHO HFA (2000) targets for equity in health -- Index.…”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
142393
Bergman's comprehensive encyclopedia of human anatomic variation.
Malden, MA : Wiley-Blackwell, 2016Table of Contents: “…Shane Tubbs 75 Thoracic duct and right lymphatic duct; Young-Bin Song 76 Lymphatics lower limb; Sadakazu Aiso, David W. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
142394
The Works and Times of Johan Huizinga (1872-1945) Writing History in the Age of Collapse
Format: Electronic eBookFull text (Open Access)
-
142395
Discourse, identity and legitimacy : self and other in representations of Iran's nuclear programme
Amsterdam ; Philadelphia : John Benjamins Publishing Company, 2015Table of Contents: “…8.1 Discourse topics analysis -- 8.2 Textual analysis: a short example -- 8.3 Referential strategy -- 8.3.1 Referential strategy: Self (the West) -- 8.3.2 Referential strategy: Other (Iran) -- 8.3.3 Referential strategy: Iran's nuclear programme -- 8.4 Predicational strategy -- 8.4.1 Predicational strategy: Self -- 8.4.2 Predicational strategy: Other -- 8.5 Argumentative strategy -- 8.5.1 Topos of threat: we are right because they are (constructed as) a threat -- 8.6 Presupposition and shared knowledge -- 8.6.1 Presupposition triggers -- 9. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142396
Clinical and basic oculomotor research : in honor of David S. Zee
New York : New York Academy of Sciences, 2005Table of Contents: “….] -- Role of the posterior parietal cortex in the initiation of saccades and vergence: right/left functional asymmetry / by Zö Kapoula ... …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
142397
Python Machine Learning By Example.
Birmingham, UNKNOWN : Packt Publishing, 2017Table of Contents: “…Chapter 8: Best Practices -- Machine learning workflow -- Best practices in the data preparation stage -- Best practice 1 -- completely understand the project goal -- Best practice 2 -- collect all fields that are relevant -- Best practice 3 -- maintain consistency of field values -- Best practice 4 -- deal with missing data -- Best practices in the training sets generation stage -- Best practice 5 -- determine categorical features with numerical values -- Best practice 6 -- decide on whether or not to encode categorical features -- Best practice 7 -- decide on whether or not to select features and if so, how -- Best practice 8 -- decide on whether or not to reduce dimensionality and if so how -- Best practice 9 -- decide on whether or not to scale features -- Best practice 10 -- perform feature engineering with domain expertise -- Best practice 11 -- perform feature engineering without domain expertise -- Best practice 12 -- document how each feature is generated -- Best practices in the model training, evaluation, and selection stage -- Best practice 13 -- choose the right algorithm(s) to start with -- Naive Bayes -- Logistic regression -- SVM -- Random forest (or decision tree) -- Neural networks -- Best practice 14 -- reduce overfitting -- Best practice 15 -- diagnose overfitting and underfitting -- Best practices in the deployment and monitoring stage -- Best practice 16 -- save, load, and reuse models -- Best practice 17 -- monitor model performance -- Best practice 18 -- update models regularly -- Summary -- Index.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
142398
Acoustical imaging : techniques and applications for engineers
Chichester, West Sussex, UK : Wiley, A John Wiley & Sons, Ltd., Publication, 2012Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
142399
Encyclopedia of Biometrics
Boston, MA : Springer US : Imprint: Springer, 2015Table of Contents: “…Access Control, Logical -- Access Control, Physical -- Age Estimation -- Anatomy of Friction Ridge Skin -- Anatomy of the Hand -- And-Or Graph Face Model and Its Applications in Artistic Sketching and Aging Simulation -- ANSI/NIST-ITL Standard: Data Format for the Interchange of Fingerprint, Facial, and Other Biometric Information -- Anti-spoofing, Evaluation Methodologies -- Anti-spoofing, Face -- Anti-spoofing, Face Databases -- Anti-spoofing, Fingerprint (Fake Fingers) -- Anti-spoofing, Fingerprint (Hardware and Software) -- Anti-spoofing, Fingerprint Databases -- Anti-spoofing, Iris -- Anti-spoofing, Iris Databases -- Anti-spoofing, Multimodal -- Anti-spoofing,Voice -- Anti-spoofing, Voice Conversion -- Anti-spoofing, Voice Databases -- Automatic Analysis of Facial Expressions -- Automatic Classification of Left/Right Iris Image -- Background Checks -- Back-of-Hand Vascular Recognition -- BioAPI, Standardization -- Biometric Algorithms -- Biometric and User Data, Binding of -- Biometric Applications, Overview -- Biometric Data Interchange Format Standards -- Biometric Identity Assurance Services -- Biometric Interfaces -- Biometric Sample Acquisition -- Biometric Sample Quality -- Biometric Sample Quality, Standardization -- Biometric Sample Synthesis -- Biometric Security Standards -- Biometric Sensor and Device, Overview -- Biometric System Design, Overview -- Biometric System-on-Card -- Biometric System-on-Card, Standardization -- Biometric Systems, Agent-Based -- Biometric Technical Interface, Standardization -- Biometric Template Binarization -- Biometric Verification/Identification/Authentication/Recognition: The Terminology -- Biometric Vocabulary Standardization -- Biometric Vulnerabilities, Overview -- Biometric Zoo Menagerie -- Biometrics on Mobile Devices -- Biometrics, Overview -- Cancelable Biometrics -- Fingerprint Databases for Technology Evaluation, Characterization and Measurement of Difficulty -- Cohort-Based Score Normalization -- Common Biometric Exchange Formats Framework Standardization -- Comparative Anatomy of the Face -- Configuration Issues, System Design -- Deformable Models -- Dental Biometrics -- Digitizing Tablet -- DNA Data Format Standardization -- Ear Biometrics -- Ear Biometrics, 3D -- Earprints, Forensic Evidence of -- Ear Recognition, Physical Analogies -- EEG Biometrics -- Embedded Systems -- Encryption, Biometric -- Ensemble Learning -- Environmental Testing Methodology of Biometric System Performance, Standardization -- Ergonomic Design for Biometric Systems -- Eye Features and Anatomy -- Face Alignment -- Face Databases and Evaluation -- Face Detection -- Face Device -- Face Misalignment Problem -- Face Pose Analysis -- Face Recognition Standards -- Face Recognition, 3D-Based -- Face Recognition, Component-Based -- Face Recognition, Geometric vs. …”
Format: Electronic eBookFull text (Wentworth users only)
-
142400
Mastering Kali Linux Wireless Pentesting.
Birmingham : Packt Publishing, Limited 2016Table of Contents: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Wireless Penetration Testing Fundamentals -- Wireless communication -- Wireless standards -- The 2.4 GHz spectrum -- The 5 GHz spectrum -- Choosing the right equipment -- Supported wireless modes -- Wireless adapters -- Ralink RT3070 -- Atheros AR9271 -- Ralink RT3572 -- Antennas -- Omnidirectional antennas -- Patch antennas -- Yagi antennas -- Kali Linux for the Wireless Pentester -- Downloading Virtual Box -- Installing Virtual Box -- Kali Linux deployment -- Mapping the wireless adapter into Kali -- Summary -- Chapter 2: Wireless Network Scanning -- Wireless network discovery -- 802.11 network terminology -- 802.11 configuration modes -- 802.11 Frames -- Management Frame -- Control frames -- Data frames -- The scanning phase -- Passive scanning -- Active scanning -- Tools of the trade -- Airodump-ng -- Adding a location to Airodump-ng with GPS -- Visually displaying relationships with Airgraph-ng -- Discovering Client Probes with Hoover -- WPS discovery with Wash -- Kismet -- Wireshark -- Summary -- Chapter 3: Exploiting Wireless Devices -- Attacking the firmware -- Authentication bypass -- CVE-2013-7282 -- CVE-2013-6026 -- CVE-2015-7755 -- Cross-Site Request Forgery -- CVE-2014-5437 -- CVE-2014-8654 -- CVE-2013-2645 -- Remote code execution -- CVE-2014-9134 -- Command injection -- CVE-2008-1331 -- Denial of Service -- OSVDB-102605 -- CVE-2009-3836 -- Information disclosure -- CVE-2014-6621 -- CVE-2014-6622 -- CVE-2015-0554 -- Attacking the services -- Attacking Telnet -- Attacking SSH -- Attacking SNMP -- CVE-2014-4863: Arris Touchstone DG950A SNMP information disclosure -- CVE-2008-7095: Aruba Mobility Controller SNMP community string dislosure -- Attacking SNMP -- Attacking UPnP -- Discovery.…”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)