Search Results - (((((((anti OR santis) OR wkants) OR hands) OR cantor) OR anne) OR file) OR wsanting) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 91
- Mathematical models 72
- Mathematics 60
- Machine learning 49
- Artificial intelligence 48
- Algorithms 45
- algorithms 38
- methods 36
- artificial intelligence 34
- Data mining 32
- Computer networks 26
- Python (Computer program language) 25
- Signal processing 25
- Artificial Intelligence 24
- Digital techniques 23
- Development 22
- Computer algorithms 21
- Diseases 21
- Application software 20
- Data Mining 20
- Technological innovations 20
- Computer simulation 19
- Image processing 19
- Computer security 17
- Mathematical optimization 17
- Research 17
- Computer science 15
- Social aspects 15
- Statistical methods 15
- Computational Biology 14
Search alternatives:
-
1
-
2
Optimization of Computer Networks : Modeling and Algorithms: a Hands-On Approach.
Published 2016Full text (MFA users only)
Electronic eBook -
3
-
4
Data Clustering : Algorithms and Applications.
Published 2013Full text (MFA users only)
Electronic eBook -
5
Theory of randomized search heuristics : foundations and recent developments
Published 2011Full text (MFA users only)
Electronic eBook -
6
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Published 2018Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
Full text (MFA users only)
Electronic eBook -
7
Algorithmic trading : winning strategies and their rationale
Published 2013Full text (MFA users only)
Electronic eBook -
8
Algorithmic composition : a guide to composing music with Nyquist
Published 2013Full text (MFA users only)
Electronic eBook -
9
-
10
-
11
Bioinformatics algorithms : techniques and applications
Published 2008Full text (MFA users only)
Electronic eBook -
12
-
13
The rise of the algorithms : how YouTube and TikTok conquered the world
Published 2024Full text (MFA users only)
Electronic eBook -
14
-
15
-
16
-
17
Jewels of stringology : text algorithms.
Published 2002Table of Contents: “…Stringology. 1.1. Text file facilities. 1.2. Dictionaries. 1.3. Data compression. 1.4. …”
Full text (MFA users only)
Electronic eBook -
18
-
19
Algorithms for worst-case design and applications to risk management
Published 2002Full text (MFA users only)
Electronic eBook -
20
Stabilisation and Motion Control of Unstable Objects
Published 2015Full text (MFA users only)
Electronic eBook