Showing 137,801 - 137,820 results of 150,585 for search '(("right" OR ((((("sright" OR "brightss") OR "srights") OR ("fight" OR "night")) OR (("frights" OR ("rightss" OR ("frightsss" OR "fightsss"))) OR "wright")) OR "flightly")) OR ("eight" OR "light"))', query time: 1.20s Refine Results
  1. 137801

    Look back in anger by Osborne, John, 1929-1994

    [London] : Bloomsbury, 2013
    Format: Electronic eBook
    Full text (Emerson users only)
  2. 137802

    The ESD control program handbook by Smallwood, J. M. (Jeremy M.)

    Hoboken, NJ : John Wiley & Sons, Inc., 2020
    First edition.
    Table of Contents: “…3.3.7 Package effects -- 3.4 Some common types of ESD damage -- 3.4.1 Failure mechanisms -- 3.4.2 Breakdown of thin dielectric layers -- 3.4.3 MOSFETs -- 3.4.4 Susceptibility to electrostatic fields and breakdown between closely spaced conductors -- 3.4.5 Semiconductor junctions -- 3.4.6 Field effect structures and non-conductive device lids -- 3.4.7 Piezoelectric crystals -- 3.4.8 Light emitting diodes -- 3.4.9 Magnetoresistive heads -- 3.4.10 MicroElectroMechanical Systems (MEMS) -- 3.4.11 Burnout of device conductors or resistors -- 3.4.12 Passive components -- 3.4.13 Printed circuit boards and assemblies -- 3.4.14 Modules and system components -- 3.5 System level ESD -- 3.5.1 Introduction -- 3.5.2 The relationship between system level immunity and component ESD withstand -- 3.5.3 Charged cable ESD (Cable Discharge Events) -- 3.5.4 System-Efficient ESD Design (SEED) -- References -- Bibliography -- 4.1 Why habits? …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  3. 137803

    Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies

    Hoboken, NJ : Scrivener Publishing/Wiley, 2019
    First edition.
    Table of Contents: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  4. 137804

    Inside the EU Code of Conduct Group. by Nouwen, Martijn F.

    Amsterdam : IBFD Publications USA, Incorporated, 2021
    Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
    Format: eBook
    Full text (Emerson users only)
  5. 137805

    Database processing : fundamentals, design, and implementation by Kroenke, David M., 1946-

    Boston : Pearson, 2016
    14th edition.
    Table of Contents: “…Note continued: Changing Relationship Cardinalities -- Changing Minimum Cardinalities -- Changing Maximum Cardinalities -- Adding and Deleting Tables and Relationships -- Forward Engineering -- Summary -- Key Terms -- Review Questions -- Project Questions -- Case Questions -- The Queen Anne Curiosity Shop -- Morgan Importing -- ch. 9 Managing Multiuser Databases -- Chapter Objectives -- The Importance of Working with an Installed DBMS Product -- Database Administration -- Managing the Database Structure -- Concurrency Control -- The Need for Atomic Transactions -- Resource Locking -- Optimistic Versus Pessimistic Locking -- SQL Transaction Control Language and Declaring Lock Characteristics -- Implicit and Explicit COMMIT TRANSACTION -- Consistent Transactions -- Transaction Isolation Level -- SQL Cursors -- Database Security -- Processing Rights and Responsibilities -- DBMS Security -- DBMS Security Guidelines -- Application Security -- The SQL Injection Attack…”
    Format: Book

    This item is not available through FLO. Please contact your home library for further assistance.
  6. 137806

    Inside the EU Code of Conduct Group by Nouwen, Martijn F.

    Amsterdam : IBFD Publications USA, Incorporated, 2021
    Table of Contents: “…Harmonization of national laws necessary for the functioning of the internal market -- 9.5.2.4. Free movement rights -- 9.5.2.5. State aid prohibition -- 9.5.2.6. …”
    Format: Electronic eBook
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  7. 137807

    Cryptography, information theory, and error-correction : a handbook for the 21st century by Bruen, Aiden A., 1941-, Forcinito, Mario, 1962-, McQuillan, James M.

    Hoboken, NJ : John Wiley & Sons, Inc., 2021
    Second edition.
    Table of Contents: “…Bluetooth, WiFi, and Your Smart Phone -- 7.22 Keep Up with the Latest Attacks (If You Can) -- Notes -- Chapter 8: Practical Issues in Modern Cryptography and Communications -- 8.1 Introduction -- 8.2 Hot Issues -- 8.3 Authentication -- 8.4 User Anonymity -- 8.5 E-commerce -- 8.6 E-government -- 8.7 Key Lengths -- 8.8 Digital Rights -- 8.9 Wireless Networks -- 8.10 Communication Protocols -- Notes -- Part II: Mainly Information Theory -- Chapter 9: Information Theory and its Applications -- 9.1 Axioms, Physics, Computation -- 9.2 Entropy -- 9.3 Information Gained, Cryptography -- 9.4 Practical Applications of Information Theory -- 9.5 Information Theory and Physics -- 9.6 Axiomatics of Information Theory -- 9.7 Number Bases, Erd?…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  8. 137808

    Principles of sustainable energy systems by Kutscher, Charles F., Milford, Jana B., Kreith, Frank

    Boca Raton, FL : CRC Press, 2019
    Third edition.
    Table of Contents: “…Electric Power System -- 5.2 Electrical Transmission -- 5.3 The Electric Grid and Electricity Markets -- 5.3.1 Rate Structures -- 5.3.2 Electricity Markets -- 5.3.2.1 Energy Market -- 5.3.2.2 Capacity Market -- 5.3.2.3 Ancillary Services Market -- 5.3.2.4 Financial Transmission Rights Market -- 5.4 Grid Operations -- 5.5 Integration of Variable Renewable Energy into the Grid.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  9. 137809
  10. 137810
  11. 137811

    The Continuing challenge : the past and the future of Brown v. Board of Education : a symposium.

    Evanston, Ill. : Published for Notre Dame Center for Civil Rights by Integrated Education Associates, 1975
    Format: Book


  12. 137812

    The rise of big data policing : surveillance, race, and the future of law enforcement by Ferguson, Andrew G.

    New York : New York University Press, 2017
    Format: Book


  13. 137813

    Take Control of Shortcuts by Orchard, Rosemary

    Take Control Books, 2019
    1st edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  14. 137814

    School of Udhra by Mackey, Nathaniel, 1947-

    San Francisco : City Lights Books, 1993
    Format: Book


  15. 137815

    The Burroughs file by Burroughs, William S., 1914-1997

    San Francisco : City Lights Books, 1984
    Format: Book


  16. 137816

    Book of dreams by Kerouac, Jack, 1922-1969

    San Francisco : City Lights Books, 1981
    Format: Book


  17. 137817

    Pictures of the gone world by Ferlinghetti, Lawrence

    San Francisco : City Lights, 1955
    Format: Book


  18. 137818

    Feather woman of the jungle by Tutuola, Amos

    San Francisco : City Lights Books, 1988
    Format: Book


  19. 137819

    The ruling class by Barnes, Peter, 1931-2004

    [London] : Bloomsbury, 2013
    Format: Electronic eBook
    Full text (Emerson users only)
  20. 137820

    In Focus/Health-Stress Test What is the Health Impact on Leaders by Mcdowell-larsen, Sharon

    Center for Creative Leadership, 2002
    Format: Electronic eBook
    Full text (Wentworth users only)