Search Results - (((((((ant OR wkant) OR mwantis) OR when) OR cantor) OR anne) OR shane) OR hints) algorithms.

Search alternatives:

  1. 261

    Bayesian Analysis with Python. by Osvaldo Martin

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  2. 262

    Eat, cook, grow : mixing human-computer interactions with human-food interactions

    Published 2014
    Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
    Full text (MFA users only)
    Electronic eBook
  3. 263

    Applied Artificial Intelligence : Proceedings of the 7th International FLINS Conference. by Arena, Paolo, Fortuna, Luigi

    Published 2006
    Table of Contents: “…An extended branch-and-bound algorithm for fuzzy linear bilevel programming / G. …”
    Full text (MFA users only)
    Electronic eBook
  4. 264
  5. 265

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  6. 266
  7. 267
  8. 268

    Fundamentals of patenting and licensing for scientists and engineers by Ma, Matthew Y.

    Published 2009
    Table of Contents: “…When final rejection is received. 8.9. Appeal. 8.10. …”
    Full text (MFA users only)
    Electronic eBook
  9. 269

    Understanding large temporal networks and spatial networks : exploration, pattern searching, visualization and network evolution by Batagelj, Vladimir, 1948-

    Published 2014
    Table of Contents: “…Spanish Algorithms -- 3.8.4.A Sparse Network Algorithm -- 3.9. …”
    Full text (MFA users only)
    Electronic eBook
  10. 270

    Data and Application Security : Developments and Directions by Thuraisingham, Bhavani M.

    Published 2002
    Table of Contents: “…Protecting Information when Access is Granted for Collaboration -- Author-?…”
    Full text (MFA users only)
    Electronic eBook
  11. 271
  12. 272
  13. 273

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  14. 274

    Debates in the digital humanities 2016

    Published 2016
    Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
    Full text (MFA users only)
    Electronic eBook
  15. 275

    Machine learning for the web by Isoni, Andrea

    Published 2016
    Table of Contents: “…Preface; Introduction to Practical Machine Learning Using Python; General machine-learning concepts; Machine-learning example; Installing and importing a module (library); Preparing, manipulating and visualizing data -- NumPy, pandas and matplotlib tutorials; Using NumPy; Arrays creation; Array manipulations; Array operations; Linear algebra operations; Statistics and mathematical functions; Understanding the pandas module; Exploring data; Manipulate data; Matplotlib tutorial; Scientific libraries used in the book; When to use machine learning; Summary; Unsupervised Machine Learning.…”
    Full text (MFA users only)
    Electronic eBook
  16. 276

    Test driven development in Ruby : a practical introduction to TDD using problem and solution domain analysis by Paranj, Bala

    Published 2017
    Table of Contents: “…Problem Domain AnalysisSolution Domain Analysis; Alternative Representations; Divide and Conquer Strategy; Designing Test Cases; Sum a List of Numbers; Sequence of Test Cases; Starter Test; Next Test ; Story Test ; Assertion; Test Driving Calculator; Canonical Test Structure; Given; When; Then; Arrange, Act, Assert; Calculator; Addition; Subtraction; Common Mistakes; Common Mistakes in the TDD Cycle; Mistakes in Step One; Mistakes in Step Two; Mistakes in Step Three; Mistakes in Step Four; Mistakes in Step Five; Base Conversion; Problem Statement; Problem Domain Analysis.…”
    Full text (MFA users only)
    Electronic eBook
  17. 277

    Foreign exchange: the complete deal : a comprehensive guide to the theory and practice of the forex market by Sharpe, James

    Published 2012
    Table of Contents: “…When liquidity disappears -- The carry trade and Torschlusspanik (door shut panic) -- 12. …”
    Full text (MFA users only)
    Electronic eBook
  18. 278

    Deep Learning with TensorFlow : Explore neural networks and build intelligent systems with Python, 2nd Edition. by Zaccone, Giancarlo

    Published 2018
    Table of Contents: “…; Artificial neural networks; The biological neurons; The artificial neuron; How does an ANN learn?; ANNs and the backpropagation algorithm; Weight optimization; Stochastic gradient descent; Neural network architectures; Deep Neural Networks (DNNs); Multilayer perceptron; Deep Belief Networks (DBNs).…”
    Full text (MFA users only)
    Electronic eBook
  19. 279

    W.C. McKern and the Midwestern Taxonomic Method by Lyman, R. Lee

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  20. 280