Search Results - "Anonymity"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    معجم الاسماء المستعارة واصحابها : لاسيما في الادب العربي الحديث by داغر, يوسف اسعد

    Published 1982
    Subjects: “…Anonyms and pseudonyms, Arabic…”
  2. 2

    Primary colors by Furnas, Brent

    Published 1999
  3. 3

    Maximum linux security : a Hacker's guide to protecting your linux server and workstation by Anonymous

    Published 2000
  4. 4
  5. 5

    Introduction to privacy-preserving data publishing : concepts and techniques by Fung, Benjamin C. M.

    Published 2011
    Table of Contents: “…Anonymizing complex data…”
  6. 6

    Abstraction and closure in computer science [ by Velasquez, Raphael

    Published 2014
    Table of Contents: “…Levels of abstraction -- 6. Anonymous function…”
    World Technologies
  7. 7

    Computer ethics : a global perspective by Stamatellos, Giannis , 1970-

    Published 2007
    Table of Contents: “…Computer crime and security -- 3. Privacy and anonymity -- 4. Intellectual property -- 5. computer reliability -- 2-Social impact : 6. …”
  8. 8

    A brief illustrated history of machines and mechanisms by Bautista Paz, Emilio

    Published 2010
    Table of Contents: “…1. Anonymous developments -- 2. Chinise inventions and machines -- 3. …”
  9. 9

    Know all about internet privacy [ by Murdock, Keon

    Published 2014
    Table of Contents: “…Privacy in file sharing networks and secure messaging -- 7. SOCKS -- 8. Tor (anonymity network) -- 9. Virtual private network -- 10. …”
    World Technologies
  10. 10

    Mobile and wireless network security and privacy by Makki, S. Kami

    Published 2007
    Table of Contents: “…On performance cost of on-demand anonymous routing protocols in mobile ad hoc networks -- 7. …”
    Table of contents only
  11. 11

    Malware Analyst's cookbook and dvd : tools and techniques for fighting malicious code by Ligh, Michael W., Ligh, Michael Hale

    Published 2011
    Table of Contents: “…Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.…”
  12. 12

    An introduction to lambda calculus [ by Ricci, Raven

    Published 2014
    Table of Contents: “…Binary lambda calculus -- 5. Anonymous function -- 6. Apply and director string -- 7. …”
    World Technologies
  13. 13

    Social work research with minority and oppressed populations : methodological issues and innovations by Potocky, Miriam, Rodgers-Farmer, Antoinette Y.

    Published 2013
    Table of Contents: “…1. Anonymous enrollment in AIDS prevention -- 2. Methodological issues when developing prevention programs for low income, urban adolescents -- 3. …”
  14. 14

    Gender, law and justice in a global market by Stewart, Ann

    Published 2011
    Table of Contents: “…Gender justice in Africa : politics of culture or culture of economics? -- 6. From anonymity to attribution : producing food in a global value chain -- 7. …”
  15. 15

    Information and internet privacy handbook [ by Courtney, Kylan, Murdock, Keon

    Published 2014
    Table of Contents: “…Privacy in file sharing networks and secure messaging -- 13. SOCKS -- 14. Tor (anonymity network)…”
    world Technologies
  16. 16

    Functional programming & lambda calculus [ by Ricci, Raven, Bell, Alia

    Published 2012
    Table of Contents: “…Binary lambda calculus -- 11. Anonymous function -- 12. Apply and director string -- 13. …”
    College Publishing House
  17. 17

    Ethical and social issues in the information age by Kizza, Joseph Migga

    Published 2013
    Table of Contents: “…Ethics and the professions -- 5. Anonymity, security, privacy, and civil liberties -- 6. …”
    Connect to resource
    Connect to resource
    Connect to resource (off-campus access)
  18. 18

    MRI from picture to proton by McRobbie, Donald W. , 1958-

    Published 2007
    Table of Contents: “…: bio-effects -- Ghosts in the machine : quality control -- Acronyms anonymous : a guide to the pulse sequence jungle -- Go with the flow : MR angiography -- A heart to heart discussion : cardiac MRI -- It's not just squiggles : in-vivo spectroscopy -- To BOLDly go : new frontiers -- The parallel universe : parallel imaging and novel acquisition techniques -- Appendix: Maths revision.…”
    Table of contents only
    Contributor biographical information
    Publisher description
  19. 19

    Hybrid : the history and science of plant breeding by Kingsbury, Noel

    Published 2009
  20. 20

    Plant breeding reviews. Volume 36

    Published 2012