Search alternatives:
hackers » trackers (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
beams » beam (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
hackers » trackers (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
beams » beam (Expand Search)
bear » besar (Expand Search), year (Expand Search), near (Expand Search)
-
241
-
242
Cost-effectiveness of MRI targeted biopsy strategies for diagnosing prostate cancer in Singapore
Published 2022Get full text
Journal Article -
243
Development of a protein nanoparticle platform for targeting EGFR expressing cancer cells
Published 2015Get full text
Get full text
Get full text
Journal Article -
244
21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004
Published 2004Subjects: Get full text
Learning Object -
245
Robust delivery of RIG-I agonists using extracellular vesicles for anti-cancer immunotherapy
Published 2022Get full text
Journal Article -
246
-
247
-
248
Practical fuzzing on open-source projects
Published 2022“…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
Get full text
Final Year Project (FYP) -
249
Evaluation of the music collection at the National Institute of Education Library
Published 2011“…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
Get full text
Thesis -
250
A model of information security and competition
Published 2024“…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
Journal article -
251
Experimental and numerical evaluation of composite floor systems under fire conditions
Published 2014“…This paper presents novel experimental results and observations from three one-quarter scale tests on two-way concrete slabs supported by protected steel edge beams under fire conditions. The sizes of the protected secondary edge beams were varied to study the effect of beam stiffness on the fire behaviour of the assemblies. …”
Get full text
Get full text
Journal Article -
252
Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t...
Published 2024“…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
Book -
253
Can't Hurt Me : Master Your Mind and Defy the Odds /
Published 2024“…Rising from a childhood marred by physical and emotional abuse from his father, neglect, poverty, racism, depression and being overweight, David (through sheer grit and determination), rose to become a Navy SEAL, an Army Ranger, and an Air Force Tactical Air Controller. …”
Get full text
software, multimedia -
254
Enhancing security in generic e-Commerce systems
Published 2010“…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
Get full text
Final Year Project (FYP) -
255
Investigation of low temperature wafer bonding using intermediate layer
Published 2008Get full text
Thesis -
256
-
257
Environmental audit in Singapore
Published 2015“…In addition, neither the public nor firms are willing to bear the costs of environmental audit.…”
Get full text
Final Year Project (FYP) -
258
Application of low frequency noise in the study of VLSI electromigration
Published 2008Get full text
Thesis -
259
Development of an industrial SCADA firewall prototype using single board computer - part 2
Published 2019“…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
Get full text
Final Year Project (FYP) -
260
Delving deeper into the whorl of flower segmentation
Published 2009“…This is a challenging problem because of the sheer variety of flower classes, the variability within a class and within a particular flower, and the variability of the imaging conditions – lighting, pose, foreshortening, etc.…”
Journal article