Search Results - "Anonymity"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 2
- History 2
- Lambda calculus 2
- Plant breeding 2
- Security measures 2
- Abstraction 1
- Anonyms and pseudonyms, Arabic 1
- Arabic literature 1
- Computer networks 1
- Computer security 1
- Computer securityxManagementvHandbooks, manuals, etc 1
- Computers 1
- Computers and society 1
- Confidential communications 1
- Cookies (Computer science) 1
- Data Interpretation, Statistical 1
- Data encryption (Computer science) 1
- Data protection 1
- Database security 1
- Electronic data processing 1
- Extranets (Computer networks) 1
- Functional programming (Computer science) 1
- Hybridization 1
- Intelligence officers 1
- Internet 1
- Islam 1
- Islamic fundamentalism 1
- Law and legislation 1
- Legal status, laws, etc 1
- Machinery 1
-
1
معجم الاسماء المستعارة واصحابها : لاسيما في الادب العربي الحديث
Published 1982Subjects: “…Anonyms and pseudonyms, Arabic…”
-
2
-
3
-
4
-
5
Introduction to privacy-preserving data publishing : concepts and techniques
Published 2011Table of Contents: “…Anonymizing complex data…”
-
6
Abstraction and closure in computer science [
Published 2014Table of Contents: “…Levels of abstraction -- 6. Anonymous function…”
World Technologies
-
7
Computer ethics : a global perspective
Published 2007Table of Contents: “…Computer crime and security -- 3. Privacy and anonymity -- 4. Intellectual property -- 5. computer reliability -- 2-Social impact : 6. …”
-
8
A brief illustrated history of machines and mechanisms
Published 2010Table of Contents: “…1. Anonymous developments -- 2. Chinise inventions and machines -- 3. …”
-
9
Know all about internet privacy [
Published 2014Table of Contents: “…Privacy in file sharing networks and secure messaging -- 7. SOCKS -- 8. Tor (anonymity network) -- 9. Virtual private network -- 10. …”
World Technologies
-
10
Mobile and wireless network security and privacy
Published 2007Table of Contents: “…On performance cost of on-demand anonymous routing protocols in mobile ad hoc networks -- 7. …”
Table of contents only
-
11
Malware Analyst's cookbook and dvd : tools and techniques for fighting malicious code
Published 2011Table of Contents: “…Anonymizing your activities -- Honeypots -- Malware classification -- Sandboxes and multi-AV scanners -- Researching domains and IP addresses -- documents, shellcode, and URLs -- Malware labs -- Automation -- Dynamic analysis -- Malware forensics -- Debugging malware -- De-obfuscation -- Working with DLLs -- Kernel debugging -- Memory forensics with volatility -- Memory forensics: code injection and extraction -- Memory forensics: rootkits -- Memory forensics: network and registry.…”
-
12
An introduction to lambda calculus [
Published 2014Table of Contents: “…Binary lambda calculus -- 5. Anonymous function -- 6. Apply and director string -- 7. …”
World Technologies
-
13
Social work research with minority and oppressed populations : methodological issues and innovations
Published 2013Table of Contents: “…1. Anonymous enrollment in AIDS prevention -- 2. Methodological issues when developing prevention programs for low income, urban adolescents -- 3. …”
-
14
Gender, law and justice in a global market
Published 2011Table of Contents: “…Gender justice in Africa : politics of culture or culture of economics? -- 6. From anonymity to attribution : producing food in a global value chain -- 7. …”
-
15
Information and internet privacy handbook [
Published 2014Table of Contents: “…Privacy in file sharing networks and secure messaging -- 13. SOCKS -- 14. Tor (anonymity network)…”
world Technologies
-
16
Functional programming & lambda calculus [
Published 2012Table of Contents: “…Binary lambda calculus -- 11. Anonymous function -- 12. Apply and director string -- 13. …”
College Publishing House
-
17
Ethical and social issues in the information age
Published 2013Table of Contents: “…Ethics and the professions -- 5. Anonymity, security, privacy, and civil liberties -- 6. …”
Connect to resource
Connect to resource
Connect to resource (off-campus access)
-
18
MRI from picture to proton
Published 2007Table of Contents: “…: bio-effects -- Ghosts in the machine : quality control -- Acronyms anonymous : a guide to the pulse sequence jungle -- Go with the flow : MR angiography -- A heart to heart discussion : cardiac MRI -- It's not just squiggles : in-vivo spectroscopy -- To BOLDly go : new frontiers -- The parallel universe : parallel imaging and novel acquisition techniques -- Appendix: Maths revision.…”
Table of contents only
Contributor biographical information
Publisher description
-
19
-
20