Arama Sonuçları - Denial Bay~
Önerilen Konular
Önerilen Konular
- Communications Engineering, Networks 4
- Telecommunication 4
- Data and Information Security 3
- Data protection 3
- Big Data 2
- Big data 2
- Computational Intelligence 2
- Computational intelligence 2
- General 2
- Administration 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Business & Economics 1
- Business IT Infrastructure 1
- Computer Communication Networks 1
- Computer crimes 1
- Computer input-output equipment 1
- Computer networks 1
- Conduct of life 1
- Crime & criminology 1
- Criminal Law 1
- Criminology 1
- Cybercrime 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Education 1
- Gönüllü yalınlık akımı 1
- Human-computer interaction 1
- Imprisonment 1
- Industrial sociology 1
-
1
-
2
Security and Data Storage Aspect in Cloud Computing
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
3
Advances in Communication, Cloud, and Big Data Proceedings of 2nd National Conference on CCB 2016 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…A Survey: EMG Signal Based Controller as Human Computer Interaction -- Chapter 14 [CCB 1622-] IEEE 802.15.4 as the MAC protocol for Internet of Things (IoT) Applications for achieving QoS and Energy Efficiency -- Chapter 15. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
4
Punishment and incarceration a global perspective /
Baskı/Yayın Bilgisi 2014İçindekiler: “…Corcoran -- 'Ceci N'est Pas Une Fouille A Corps' : the denial of strip searches in Belgian prisons / Tom Daems -- Stuck : conditions of Canadian confinement / Rose Ricciardelli, Hayley Crichton, Lisa Adams -- Women prisoners : theory and reality in Mexico / Elena Azaola -- Three waves of American prison development, 1790-1920 / Ashley T. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
5
Computational Science/Intelligence & Applied Informatics
Baskı/Yayın Bilgisi 2019İçindekiler: “…A Branch-and-Bound Based Exact Algorithm for the Maximum Edge-Weight Clique Problem (Satoshi Shimizu) -- Chapter 4. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
6
Advanced Multimedia and Ubiquitous Engineering Future Information Technology Volume 2 /
Baskı/Yayın Bilgisi 2016İçindekiler: “…From the Contents: The study on the detection of the damaged file using the graph of the information entropy for Security Management -- Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications -- A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds -- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-based Formal Analysis.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
7
Research in the sociology of work.
Baskı/Yayın Bilgisi 2016İçindekiler: “…Work identity without steady work: lessons from stage actors / Robin Leidner -- I'm a teacher, not a babysitter: workers' strategies for managing identity-related denials of dignity in the early childhood workplace / Jennifer Nelson, Amanda Lewis -- Job authority and stratification beliefs / George Wilson, Vincent Roscigno -- Matching up: producing proximal service in a Los Angeles restaurant / Eli Wilson -- Control from on high: cloud-computing, skill, and acute frustration among analytics workers in the digital publishing industry / Michael Siciliano -- The limits of control in service work: interactive routines and interactional competence / Brian Ott -- The walk-in closet: between "gay-friendly" and "post-closeted" work / David Orzechowicz -- Workplace regulation of sexual harassment and federal and state-level legal environments / Julie Kmec, C. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
8
Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel,...
Baskı/Yayın Bilgisi 2018İçindekiler: “…Cybersecurity management through logging analytics -- Adaptive weak secrets for authenticated key exchange -- Internet of things and distributed denial of service mitigation -- Eye tracking graphical passwords -- Understanding and discovering SQL injection vulnerabilities -- Grid framework to address password memorability issues and offline password attacks -- Exploring 3D cybersecurity visualization with the Microsoft HoloLens -- Humans as the strong link in securing the total learning architecture -- Preserving dignity, maintaining security and acting ethically -- Human factors in information security culture: A literature review -- Do you really trust "privacy policy" or "terms of use" agreements without reading them? …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
9
Administering special education in pursuit of dignity and autonomy /
Baskı/Yayın Bilgisi 2004Full-text access
OPAC'ta görüntüle
e-Kitap -
10
Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 /
Baskı/Yayın Bilgisi 2016İçindekiler: “…Implementation & Integration of Cellular/GPS Based Vehicle Tracking System with Google Maps Using a Web Portal -- Chapter 55. …”
Full-text access
OPAC'ta görüntüle
e-Kitap