Search Results - (((((((kant OR want) OR mantis) OR when) OR cantor) OR anne) OR share) OR hints) algorithms.

  1. 201
  2. 202
  3. 203

    Experiencing architecture in the nineteenth century : buildings and society in the modern age

    Published 2019
    Table of Contents: “…'The pressing public want of the age': The arrival of the grand hotel'Bitter competition in the London hotel world': The problem of publicity; 'A wealthy man's private mansion': The assurance of exclusivity; The 'spirit of the time': Cosmopolitanism and heterosociability; Conclusion; Chapter 10: 'The fullest fountain of advancing civilization': Experiencing Anthony Trollope's House of Commons, 1852-82; Experiences of Parliament; Progressive architecture; A political theatre; Conclusion: Reading experiences.…”
    Full text (MFA users only)
    Electronic eBook
  4. 204

    Java Deep Learning Projects : Implement 10 Real-World Deep Learning Applications Using Deeplearning4j and Open Source APIs. by Karim, Rezaul

    Published 2018
    Table of Contents: “…; Artificial Neural Networks; Biological neurons; A brief history of ANNs; How does an ANN learn?; ANNs and the backpropagation algorithm; Forward and backward passes; Weights and biases; Weight optimization; Activation functions.…”
    Full text (MFA users only)
    Electronic eBook
  5. 205
  6. 206

    Handbook of operations research in natural resources

    Published 2007
    Full text (MFA users only)
    Electronic eBook
  7. 207

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  8. 208
  9. 209
  10. 210

    Creating E-Learning Games with Unity. by Horachek, David

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  11. 211

    Uncommon sense : investment wisdom since the stock market's dawn by Kemp, Michael E.

    Published 2015
    Table of Contents: “…-- RELATING BOOK VALUE PER SHARE TO MARKET PRICE -- WHAT IS A LOW P/B RATIO TELLING US? …”
    Full text (MFA users only)
    Electronic eBook
  12. 212

    The bitcoin big bang : how alternative currencies are about to change the world by Kelly, Brian, 1971-

    Published 2014
    Table of Contents: “…; What Is Cryptography?; Still Want to Be a Miner?; Do We Need Another Bitcoin?; 7 Nautiluscoin-0 to 1 Million in 60 Days; Creating the Coin; Did It Work?…”
    Full text (MFA users only)
    Electronic eBook
  13. 213

    Big Data and HPC. by Grandinetti, L.

    Published 2018
    Table of Contents: “…Reliability-Aware Voltage Scaling of Multicore Processors in Dark Silicon EraTime Collection: An Abstraction for Shared Objects in Parallel Programming; Parallel and Distributed Analysis of Microarray Data; Extracting Distributed Architecture from Source Code Using an Evolutionary Approach; An Architectural Approach to Grid Provisioning; Subject Index; Author Index.…”
    Full text (MFA users only)
    Electronic eBook
  14. 214

    Ethnic studies in academic and research libraries

    Published 2021
    Table of Contents: “…"Build it and they will come" -- Fostering transformation -- The value of integrating African American archives into undergraduate studies -- Improving representation on Wikipedia -- Returning to where it all began and connecting the dots -- Collaborative and active engagement at the Hemispheric University -- Librarians and leaders -- Crafting contemporary indigenous studies collections in the age of algorithms -- Building a Vietnamese language collection with the Vietnamese diaspora community -- Engaging with ethnic studies librarians -- For when they arrive -- BIPOC voices speak -- Supporting faculty in indigenizing curriculum and pedagogy -- Student-driven collecting efforts and initiatives -- Making spaces for ethnic studies -- Modeling Black literature -- A perspective on Asian American studies and librarianship -- Holdings in the archives are closer than they appear -- Reclaiming the Asian American history narrative -- Connecting graduate library and information studies students with ethnic studies archives.…”
    Full text (MFA users only)
    Electronic eBook
  15. 215

    Wireless sensor systems for extreme environments : space, underwater, underground and industrial

    Published 2017
    Table of Contents: “…Chapter 4 On Improving Connectivity-based Localization in Wireless Sensor Networks4.1 Introduction; 4.2 Connectivity-based Localization in One-hop Networks; 4.2.1 The Centroid Algorithm; 4.2.2 Improved Centroid Algorithms; 4.3 Connectivity-based Localization in Multi-hop Networks; 4.3.1 The DV-hop Algorithm; 4.3.2 Mathematics of Hop-count-based Localization; 4.4 On Improving Connectivity-based Localization; 4.4.1 Improvements by Adjusting Correction Factor; 4.4.2 Improvements by Exploiting Neighborhood Information; 4.5 Summary; References.…”
    Full text (MFA users only)
    Electronic eBook
  16. 216
  17. 217
  18. 218

    CUDA programming : a developer's guide to parallel computing with GPUs by Cook, Shane

    Published 2013
    Table of Contents: “…ALGORITHMIC ISSUESFINDING AND AVOIDING ERRORS; DEVELOPING FOR FUTURE GPUS; FURTHER RESOURCES; CONCLUSION; References; Index.…”
    Full text (MFA users only)
    Electronic eBook
  19. 219

    AI and human thought and emotion by Freed, Sam (Philosophy professor)

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  20. 220

    OIPE 2012

    Published 2014
    Full text (MFA users only)
    Electronic eBook