Search Results - (((((((kant OR wanti) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

Refine Results
  1. 561

    Liquid surfaces and interfaces : synchrotron X-ray methods by Pershan, Peter S., 1934-

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  2. 562
  3. 563

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Metasploit Payloads / Peter Van Eeckhoutte -- Meterpreter / Peter Van Eeckhoutte -- Exploiting WebDAV Default Credentials / Peter Van Eeckhoutte -- Running a Script on the Target Web Server / Peter Van Eeckhoutte -- Uploading a Msfvenom Payload / Peter Van Eeckhoutte -- Exploiting Open phpMyAdmin / Peter Van Eeckhoutte -- Downloading a File with TFTP / Peter Van Eeckhoutte -- Downloading Sensitive Files / Peter Van Eeckhoutte -- Downloading a Configuration File / Peter Van Eeckhoutte -- Downloading the Windows SAM / Peter Van Eeckhoutte -- Exploiting a Buffer Overflow in Third-Party Software / Peter Van Eeckhoutte -- Exploiting Third-Party Web Applications / Peter Van Eeckhoutte -- Exploiting a Compromised Service / Peter Van Eeckhoutte -- Exploiting Open NFS Shares / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 9. …”
    Full text (MFA users only)
    Electronic eBook
  4. 564

    Optimal learning by Powell, Warren B., 1955-

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  5. 565

    Systemic architecture : operating manual for the self-organizing city by Poletto, Marco

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  6. 566
  7. 567
  8. 568

    Power system monitoring and control by Bevrani, Hassan

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  9. 569

    Big Data Analytics with R. by Walkowiak, Simon

    Published 2016
    Full text (MFA users only)
    Electronic eBook