Arama Sonuçları - Denial Bay~

  • Gösterilen 1 - 10 sonuçlar arası kayıtlar. 10
Sonuçları Daraltın
  1. 1

    Azla Mutlu Olmak : Sade Yaşam Rehberi / Yazar: Jay, Francine

    Baskı/Yayın Bilgisi 2019
    OPAC'ta görüntüle
    Kitap
  2. 2

    Security and Data Storage Aspect in Cloud Computing Yazar: Deshpande, Prachi S., Sharma, Subhash C., Peddoju, Sateesh K.

    Baskı/Yayın Bilgisi 2019
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  3. 3

    Advances in Communication, Cloud, and Big Data Proceedings of 2nd National Conference on CCB 2016 /

    Baskı/Yayın Bilgisi 2019
    İçindekiler: “…A Survey: EMG Signal Based Controller as Human Computer Interaction -- Chapter 14 [CCB 1622-] IEEE 802.15.4 as the MAC protocol for Internet of Things (IoT) Applications for achieving QoS and Energy Efficiency -- Chapter 15. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  4. 4

    Punishment and incarceration a global perspective /

    Baskı/Yayın Bilgisi 2014
    İçindekiler: “…Corcoran -- 'Ceci N'est Pas Une Fouille A Corps' : the denial of strip searches in Belgian prisons / Tom Daems -- Stuck : conditions of Canadian confinement / Rose Ricciardelli, Hayley Crichton, Lisa Adams -- Women prisoners : theory and reality in Mexico / Elena Azaola -- Three waves of American prison development, 1790-1920 / Ashley T. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  5. 5

    Computational Science/Intelligence & Applied Informatics

    Baskı/Yayın Bilgisi 2019
    İçindekiler: “…A Branch-and-Bound Based Exact Algorithm for the Maximum Edge-Weight Clique Problem (Satoshi Shimizu) -- Chapter 4. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  6. 6

    Advanced Multimedia and Ubiquitous Engineering Future Information Technology Volume 2 /

    Baskı/Yayın Bilgisi 2016
    İçindekiler: “…From the Contents: The study on the detection of the damaged file using the graph of the information entropy for Security Management -- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications -- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds -- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis.…”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  7. 7

    Research in the sociology of work.

    Baskı/Yayın Bilgisi 2016
    İçindekiler: “…Work identity without steady work: lessons from stage actors / Robin Leidner -- I'm a teacher, not a babysitter: workers' strategies for managing identity-related denials of dignity in the early childhood workplace / Jennifer Nelson, Amanda Lewis -- Job authority and stratification beliefs / George Wilson, Vincent Roscigno -- Matching up: producing proximal service in a Los Angeles restaurant / Eli Wilson -- Control from on high: cloud-computing, skill, and acute frustration among analytics workers in the digital publishing industry / Michael Siciliano -- The limits of control in service work: interactive routines and interactional competence / Brian Ott -- The walk-in closet: between "gay-friendly" and "post-closeted" work / David Orzechowicz -- Workplace regulation of sexual harassment and federal and state-level legal environments / Julie Kmec, C. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  8. 8

    Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel,...

    Baskı/Yayın Bilgisi 2018
    İçindekiler: “…Cybersecurity management through logging analytics -- Adaptive weak secrets for authenticated key exchange -- Internet of things and distributed denial of service mitigation -- Eye tracking graphical passwords -- Understanding and discovering SQL injection vulnerabilities -- Grid framework to address password memorability issues and offline password attacks -- Exploring 3D cybersecurity visualization with the Microsoft HoloLens -- Humans as the strong link in securing the total learning architecture -- Preserving dignity, maintaining security and acting ethically -- Human factors in information security culture: A literature review -- Do you really trust "privacy policy" or "terms of use" agreements without reading them? …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  9. 9

    Administering special education in pursuit of dignity and autonomy /

    Baskı/Yayın Bilgisi 2004
    Full-text access
    OPAC'ta görüntüle
    e-Kitap
  10. 10

    Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 /

    Baskı/Yayın Bilgisi 2016
    İçindekiler: “…Implementation & Integration of Cellular/GPS Based Vehicle Tracking System with Google Maps Using a Web Portal -- Chapter 55. …”
    Full-text access
    OPAC'ta görüntüle
    e-Kitap