Search alternatives:
"right" » "rights" (Expand Search)
"sright" » "srights" (Expand Search), "sight" (Expand Search), "bright" (Expand Search), "slight" (Expand Search)
"brightss" » "brightsss" (Expand Search), "brightness" (Expand Search), "rights" (Expand Search), "bright" (Expand Search), "brights" (Expand Search)
"srights" » "srightss" (Expand Search), "sights" (Expand Search), "brights" (Expand Search), "slights" (Expand Search), "rights" (Expand Search)
"frights" » "frightss" (Expand Search), "rights" (Expand Search), "fights" (Expand Search)
"rightss" » "rightsss" (Expand Search), "rights" (Expand Search)
"frightsss" » "frightssss" (Expand Search), "rightsss" (Expand Search), "fightsss" (Expand Search), "frightss" (Expand Search)
"wright" » "wrights" (Expand Search)
"fight" » "might" (Expand Search)
"fightsss" » "mightsss" (Expand Search), "fights" (Expand Search)
"flightly" » "slightly" (Expand Search), "flight" (Expand Search)
"right" » "rights" (Expand Search)
"sright" » "srights" (Expand Search), "sight" (Expand Search), "bright" (Expand Search), "slight" (Expand Search)
"brightss" » "brightsss" (Expand Search), "brightness" (Expand Search), "rights" (Expand Search), "bright" (Expand Search), "brights" (Expand Search)
"srights" » "srightss" (Expand Search), "sights" (Expand Search), "brights" (Expand Search), "slights" (Expand Search), "rights" (Expand Search)
"frights" » "frightss" (Expand Search), "rights" (Expand Search), "fights" (Expand Search)
"rightss" » "rightsss" (Expand Search), "rights" (Expand Search)
"frightsss" » "frightssss" (Expand Search), "rightsss" (Expand Search), "fightsss" (Expand Search), "frightss" (Expand Search)
"wright" » "wrights" (Expand Search)
"fight" » "might" (Expand Search)
"fightsss" » "mightsss" (Expand Search), "fights" (Expand Search)
"flightly" » "slightly" (Expand Search), "flight" (Expand Search)
-
137801
Look back in anger
[London] : Bloomsbury, 2013Format: Electronic eBookFull text (Emerson users only)
-
137802
The ESD control program handbook
Hoboken, NJ : John Wiley & Sons, Inc., 2020Table of Contents: “…3.3.7 Package effects -- 3.4 Some common types of ESD damage -- 3.4.1 Failure mechanisms -- 3.4.2 Breakdown of thin dielectric layers -- 3.4.3 MOSFETs -- 3.4.4 Susceptibility to electrostatic fields and breakdown between closely spaced conductors -- 3.4.5 Semiconductor junctions -- 3.4.6 Field effect structures and non-conductive device lids -- 3.4.7 Piezoelectric crystals -- 3.4.8 Light emitting diodes -- 3.4.9 Magnetoresistive heads -- 3.4.10 MicroElectroMechanical Systems (MEMS) -- 3.4.11 Burnout of device conductors or resistors -- 3.4.12 Passive components -- 3.4.13 Printed circuit boards and assemblies -- 3.4.14 Modules and system components -- 3.5 System level ESD -- 3.5.1 Introduction -- 3.5.2 The relationship between system level immunity and component ESD withstand -- 3.5.3 Charged cable ESD (Cable Discharge Events) -- 3.5.4 System-Efficient ESD Design (SEED) -- References -- Bibliography -- 4.1 Why habits? …”
First edition.
Format: Electronic eBookFull text (Wentworth users only)
-
137803
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
Hoboken, NJ : Scrivener Publishing/Wiley, 2019Table of Contents: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution.…”
First edition.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
137804
Inside the EU Code of Conduct Group.
Amsterdam : IBFD Publications USA, Incorporated, 2021Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
Format: eBookFull text (Emerson users only)
-
137805
Database processing : fundamentals, design, and implementation
Boston : Pearson, 2016Table of Contents: “…Note continued: Changing Relationship Cardinalities -- Changing Minimum Cardinalities -- Changing Maximum Cardinalities -- Adding and Deleting Tables and Relationships -- Forward Engineering -- Summary -- Key Terms -- Review Questions -- Project Questions -- Case Questions -- The Queen Anne Curiosity Shop -- Morgan Importing -- ch. 9 Managing Multiuser Databases -- Chapter Objectives -- The Importance of Working with an Installed DBMS Product -- Database Administration -- Managing the Database Structure -- Concurrency Control -- The Need for Atomic Transactions -- Resource Locking -- Optimistic Versus Pessimistic Locking -- SQL Transaction Control Language and Declaring Lock Characteristics -- Implicit and Explicit COMMIT TRANSACTION -- Consistent Transactions -- Transaction Isolation Level -- SQL Cursors -- Database Security -- Processing Rights and Responsibilities -- DBMS Security -- DBMS Security Guidelines -- Application Security -- The SQL Injection Attack…”
14th edition.
Format: Book
This item is not available through FLO. Please contact your home library for further assistance. -
137806
Inside the EU Code of Conduct Group
Amsterdam : IBFD Publications USA, Incorporated, 2021Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
Format: Electronic eBookFull text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
137807
Cryptography, information theory, and error-correction : a handbook for the 21st century
Hoboken, NJ : John Wiley & Sons, Inc., 2021Table of Contents: “…Bluetooth, WiFi, and Your Smart Phone -- 7.22 Keep Up with the Latest Attacks (If You Can) -- Notes -- Chapter 8: Practical Issues in Modern Cryptography and Communications -- 8.1 Introduction -- 8.2 Hot Issues -- 8.3 Authentication -- 8.4 User Anonymity -- 8.5 E-commerce -- 8.6 E-government -- 8.7 Key Lengths -- 8.8 Digital Rights -- 8.9 Wireless Networks -- 8.10 Communication Protocols -- Notes -- Part II: Mainly Information Theory -- Chapter 9: Information Theory and its Applications -- 9.1 Axioms, Physics, Computation -- 9.2 Entropy -- 9.3 Information Gained, Cryptography -- 9.4 Practical Applications of Information Theory -- 9.5 Information Theory and Physics -- 9.6 Axiomatics of Information Theory -- 9.7 Number Bases, Erd?…”
Second edition.
Format: Electronic eBookFull text (Wentworth users only)
-
137808
Principles of sustainable energy systems
Boca Raton, FL : CRC Press, 2019Table of Contents: “…Electric Power System -- 5.2 Electrical Transmission -- 5.3 The Electric Grid and Electricity Markets -- 5.3.1 Rate Structures -- 5.3.2 Electricity Markets -- 5.3.2.1 Energy Market -- 5.3.2.2 Capacity Market -- 5.3.2.3 Ancillary Services Market -- 5.3.2.4 Financial Transmission Rights Market -- 5.4 Grid Operations -- 5.5 Integration of Variable Renewable Energy into the Grid.…”
Third edition.
Format: Electronic eBookFull text (Wentworth users only)
-
137809
Mastering Unreal Technology, Volume I Introduction to Level Design with Unreal Engine 3
Sams, 2009
1st edition.Format: Electronic eBookFull text (Wentworth users only)
-
137810
Rising force : the magic of magnetic levitation
Cambridge, Mass. : Harvard University Press, 2011Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
137811
The Continuing challenge : the past and the future of Brown v. Board of Education : a symposium.
Evanston, Ill. : Published for Notre Dame Center for Civil Rights by Integrated Education Associates, 1975Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137812
The rise of big data policing : surveillance, race, and the future of law enforcement
New York : New York University Press, 2017Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137813
Take Control of Shortcuts
Take Control Books, 2019
1st edition.Format: Electronic eBookFull text (Wentworth users only)
-
137814
School of Udhra
San Francisco : City Lights Books, 1993Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137815
The Burroughs file
San Francisco : City Lights Books, 1984Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137816
Book of dreams
San Francisco : City Lights Books, 1981Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137817
Pictures of the gone world
San Francisco : City Lights, 1955Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137818
Feather woman of the jungle
San Francisco : City Lights Books, 1988Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
137819
The ruling class
[London] : Bloomsbury, 2013Format: Electronic eBookFull text (Emerson users only)
-
137820
In Focus/Health-Stress Test What is the Health Impact on Leaders
Center for Creative Leadership, 2002Format: Electronic eBookFull text (Wentworth users only)