Showing 221 - 240 results of 261 for search 'Cloud 9 (play)', query time: 0.34s Refine Results
  1. 221

    100 Ideas for Primary Teachers: Supporting EAL Learners. by Pim, Chris

    London : Bloomsbury Publishing PLC, 2018
    Table of Contents: “…Cover; Half Title; Series; Title; Copyright; Contents; Acknowledgements; Introduction; Acronyms; How to use this book; Part 1: Induction and transition; 1 School information and induction materials; 2 Effective parent conferencing; 3 Gathering background information; 4 Survival language; 5 Language audit; 6 Visual timetables; 7 Develop a peer buddy programme; 8 Personal workbooks; 9 Using Google Earth"!to help settle new arrivals; 10 Using Google Maps"!…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  2. 222

    Data Governance From the Fundamentals to Real Cases

    Cham : Springer Nature Switzerland : Imprint: Springer, 2023
    1st ed. 2023.
    Format: Electronic eBook
    Full text (Wentworth users only)
  3. 223

    Hitchcock by Truffaut, François

    New York : Simon and Schuster, 1967
    Table of Contents: “…-- Rope: From 7:30 to 9:15 in one shot -- Clouds of spun glass -- Colors and shadows -- Walls that fade away -- Films must be cut -- How to make noises rise from the street -- Under Capricorn -- Infantilism and other errors in judgment -- Run for cover! …”
    Format: Book


  4. 224

    Third Congress on Intelligent Systems Proceedings of CIS 2022, Volume 1

    Singapore : Springer Nature Singapore : Imprint: Springer, 2023
    1st ed. 2023.
    Format: Electronic eBook
    Full text (Wentworth users only)
  5. 225

    Quantum aspects of life

    London : Hackensack, NJ ; London : Imperial College Press ; Distributed by World Scientific, 2008
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  6. 226

    Business Innovation with New ICT in the Asia-Pacific: Case Studies

    Singapore : Springer Singapore : Imprint: Springer, 2021
    1st ed. 2021.
    Format: Electronic eBook
    Full text (Wentworth users only)
  7. 227

    The smart cyber ecosystem for sustainable development

    Hoboken, NJ : Beverly, MA : Wiley ; Scrivener, 2021
    Table of Contents: “…ensing) -- 18.5.3 Network Layer -- 18.5.4 Service Layer (Support) -- 18.5.5 Application Layer (Interface) -- 18.6 Security Issues in Fog Computing -- 18.6.1 Virtualization Issues -- 18.6.2 Web Security Issues -- 18.6.3 Internal/External Communication Issues -- 18.6.4 Data Security Related Issues -- 18.6.5 Wireless Security Issues -- 18.6.6 Malware Protection -- 18.7 Machine Learning for Secure Fog Computing -- 18.7.1 Layer 1 Cloud -- 18.7.2 Layer 2 Fog Nodes For The Community -- 18.7.3 Layer 3 Fog Node for Their Neighborhood -- 18.7.4 Layer 4 Sensors -- 18.8 Existing Security Solution in Fog Computing -- 18.8.1 Privacy-Preserving in Fog Computing -- 18.8.2 Pseudocode for Privacy Preserving in Fog Computing -- 18.8.3 Pseudocode for Feature Extraction -- 18.8.4 Pseudocode for Adding Gaussian Noise to the Extracted Feature -- 18.8.5 Pseudocode for Encrypting Data -- 18.8.6 Pseudocode for Data Partitioning -- 18.8.7 Encryption Algorithms in Fog Computing -- 18.9 Recommendation and Future Enhancement -- 18.9.1 Data Encryption -- 18.9.2 Preventing from Cache Attacks -- 18.9.3 Network Monitoring -- 18.9.4 Malware Protection -- 18.9.5 Wireless Security -- 18.9.6 Secured Vehicular Network -- 18.9.7 Secure Multi-Tenancy -- 18.9.8 Backup and Recovery -- 18.9.9 Security with Performance -- 18.10 Conclusion -- References -- 19 Cybersecurity and Privacy Fundamentals 353 Ravi Verma -- 19.1 Introduction -- 19.2 Historical Background and Evolution of Cyber Crime -- 19.3 Introduction to Cybersecurity -- 19.3.1 Application Security -- 19.3.2 Information Security -- 19.3.3 Recovery From Failure or Disaster -- 19.3.4 Network Security -- 19.4 Classification of Cyber Crimes -- 19.4.1 Internal Attacks -- 19.4.2 External Attacks -- 19.4.3 Unstructured Attack -- 19.4.4 Structured Attack -- 19.5 Reasons Behind Cyber Crime -- 19.5.1 Making Money -- 19.5.2 Gaining Financial Growth and Reputation -- 19.5.3 Revenge -- 19.5.4 For Making Fun -- 19.5.5 To Recognize -- 19.5.6 Business Analysis and Decision Making -- 19.6 Various Types of Cyber Crime -- 19.6.1 Cyber Stalking -- 19.6.2 Sexual Harassment or Child Pornography -- 19.6.3 Forgery -- 19.6.4 Crime Related to Privacy of Software and Network Resources -- 19.6.5 Cyber Terrorism -- 19.6.6 Phishing, Vishing, and Smishing -- 19.6.7 Malfunction -- 19.6.8 Server Hacking -- 19.6.9 Spreading Virus -- 19.6.10 Spamming, Cross Site Scripting, and Web Jacking -- 19.7 Various Types of Cyber Attacks in Information Security -- 19.7.1 Web-Based Attacks in Information Security -- 19.7.2 System-Based Attacks in Information Security -- 19.8 Cybersecurity and Privacy Techniques -- 19.8.1 Authentication and Authorization -- 19.8.2 Cryptography -- 19.8.2.1 Symmetric Key Encryption -- 19.8.2.2 Asymmetric Key Encryption -- 19.8.3 Installation of Antivirus -- 19.8.4 Digital Signature -- 19.8.5 Firewall -- 19.8.6 Steganography -- 19.9 Essential Elements of Cybersecurity -- 19.10 Basic Security Concerns for Cybersecurity -- 19.10.1 Precaution -- 19.10.2 Maintenance -- 19.10.3 Reactions -- 19.11 Cybersecurity Layered Stack -- 19.12 Basic Security and Privacy Check List -- 19.13 Future Challenges of Cybersecurity -- References -- 20 Changing the Conventional Banking System through Blockchain 379 Khushboo Tripathi, Neha Bhateja and Ashish Dhillon -- 20.1 Introduction -- 20.1.1 Introduction to Blockchain -- 20.1.2 Classification of Blockchains -- 20.1.2.1 Public Blockchain -- 20.1.2.2 Private Blockchain -- 20.1.2.3 Hybrid Blockchain -- 20.1.2.4 Consortium Blockchain -- 20.1.3 Need for Blockchain Technology -- 20.1.3.1 Bitcoin vs. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  8. 228

    Engineering Solutions Toward Sustainable Development Proceedings of 1st International Conference on Engineering Solutions Toward Sustainable Development

    Cham : Springer Nature Switzerland : Imprint: Springer, 2024
    1st ed. 2024.
    Format: Electronic eBook
    Full text (Wentworth users only)
  9. 229

    Data Wrangling with R Load, Explore, Transform and Visualize Data for Modeling with Tidyverse Libraries. by Santos, Gustavo R.

    Birmingham : Packt Publishing, Limited, 2023
    Format: Electronic eBook
    Full text (Wentworth users only)
  10. 230
  11. 231

    Smart health technologies for the COVID-19 pandemic : Internet of medical things perspectives

    Stevenage : Institution of Engineering and Technology, 2022
    Format: Electronic eBook
    Full text (Wentworth users only)
  12. 232

    Centennial tales and selected poems. by Kirkconnell, Watson, 1895-1977

    [Toronto] Published for Acadia University by University of Toronto Press 1965
    Table of Contents: “…In the Cemetery -- 8. Pearl -- 9. The Unendurable -- 10. A Little Dust -- 11. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  13. 233
  14. 234

    Machine learning approaches for convergence of IoT and Blockchain

    Hoboken, NJ : Beverly, MA : Wiley ; Scrivener Publishing, 2021
    Format: Electronic eBook
    Full text (Wentworth users only)
  15. 235
  16. 236

    Light sources : poems by Jaffin, David, 1937-

    Bristol : Shearsman Books, 2013
    Table of Contents: “…. -- Immanuel Kant -- Free-flying bird -- Can bare-touched stones -- She I -- She II -- Teddy-eye -- If life's -- Why opera's -- For Ingo and Solvey -- Twilight -- Romance -- Mozart's -- Piano concerto 9 -- Do Mozart's finales -- For Chung -- Fragilely -- For Rosemarie -- It seemed -- The Hellenic birth -- The fear -- Illmensee -- Mobbed -- Some composers -- This sumptuous month -- She seemed -- Seems -- The Cherry Orchard (3) -- a) When per -- b) The Cherry -- c) Chekhov' -- These new appartment houses -- If good plays -- It was the way -- "No animals allowed" -- Whitsun I -- Whitsun II -- Israel -- Peonese -- Helpless -- Some wounds -- Sistine Madonna -- Largo -- Adagio -- He died -- "Judaeo-Christian" -- Still lifes -- Crossword-word puzzles -- Computer -- When her husband -- The nearer to the stage -- Why after -- Though Ibsen -- He decisioned his life -- Some.…”
    Format: Book


  17. 237

    U.S. Republicans Press FBI Chief Over Lack Of Consequence For Clinton

    [Place of publication not identified] : Reuters News & Media Inc., 2016
    Format: Electronic Video
    Streaming video (Emerson users only)
    Cover image
    Streaming video (Wentworth users only)
  18. 238

    Telecommunications crash course by Shepard, Steven

    New York, N.Y. : McGraw-Hill Education LLC., 2014
    3rd ed.
    Table of Contents: “…-- Machine-to-machine applications -- Concerns and issues -- Chapter summary -- Chapter eight questions -- 9. Transport technologies -- Point-to-point technologies -- The switching hierarchy -- Many forms of packet switching -- Optical networking -- The origins of optical fiber -- Optical fiber -- Scattering problems -- Optical amplification -- Optical receivers -- Optical fiber -- Modes: an analogy -- Why does it matter? …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  19. 239

    The technology and business of mobile telecommunications : an introduction by Hunukumbure, Mythri, 1972-

    Hoboken, NJ : John Wiley & Sons, 2022
    Format: Electronic eBook
    Full text (Wentworth users only)
  20. 240

    Robot Operating System cookbook : over 70 recipes to help you master advanced ROS concepts by Vipina Kumāra

    Birmingham, UK : Packt Publishing, 2018
    Table of Contents: “…. -- Visualizing non-scalar data -- 2D/3D images -- Getting ready -- How it works... -- Recording and playing back ROS topics -- Getting ready -- How it works... -- There's more... -- Chapter 5: Accessing Sensors and Actuators through ROS -- Introduction -- Understanding the Arduino-ROS interface -- Getting ready -- How to do it... -- How it works... -- Interfacing 9DoF Razor IMU-Arduino-ROS -- Getting ready -- How to do it... -- How it works... -- Using a GPS system -- Ublox.…”
    Format: Electronic eBook
    Full text (Wentworth users only)