Search Results - (((((((want OR santis) OR wants) OR hands) OR cantor) OR anne) OR file) OR wsanting) algorithms.

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Data Clustering : Algorithms and Applications. by Aggarwal, Charu C.

    Published 2013
    Full text (MFA users only)
    Electronic eBook
  5. 5
  6. 6

    Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis by Bramwell, Phil

    Published 2018
    Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
    Full text (MFA users only)
    Electronic eBook
  7. 7
  8. 8
  9. 9

    Algorithms and complexity by Wilf, Herbert S., 1931-2012

    Published 2002
    Full text (MFA users only)
    Electronic eBook
  10. 10

    The alphabet and the algorithm by Carpo, Mario

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  11. 11

    Bioinformatics algorithms : techniques and applications

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  12. 12

    Derivatives algorithms. Volume 1, Bones by Hyer, Tom

    Published 2010
    Full text (MFA users only)
    Electronic eBook
  13. 13
  14. 14

    Automatic sequences by Haeseler, Friedrich von

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  15. 15

    Nature-inspired optimization algorithms by Yang, Xin-She

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  16. 16

    Fundamental Data Compression. by Pu, Ida Mengyi

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  17. 17

    Jewels of stringology : text algorithms. by RYTTER, WOJCIECH

    Published 2002
    Table of Contents: “…Stringology. 1.1. Text file facilities. 1.2. Dictionaries. 1.3. Data compression. 1.4. …”
    Full text (MFA users only)
    Electronic eBook
  18. 18

    Algorithms in invariant theory by Sturmfels, Bernd, 1962-

    Published 2008
    Full text (MFA users only)
    Electronic eBook
  19. 19
  20. 20