Showing 241 - 260 results of 1,139 for search '(((hackers OR checked) OR (sheer OR cher)) OR (beams OR bear))*', query time: 0.15s Refine Results
  1. 241
  2. 242
  3. 243
  4. 244
  5. 245
  6. 246
  7. 247
  8. 248

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  9. 249

    Evaluation of the music collection at the National Institute of Education Library by Yu, Bee Lian.

    Published 2011
    “…However, the Library fared relatively better, with 71.5% holdings, when a list of "Recommended Readings/References" drawn up by the Institute's academic staff was list-checked.…”
    Get full text
    Thesis
  10. 250

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  11. 251

    Experimental and numerical evaluation of composite floor systems under fire conditions by Tan, K.-H., Nguyen, T.-T.

    Published 2014
    “…This paper presents novel experimental results and observations from three one-quarter scale tests on two-way concrete slabs supported by protected steel edge beams under fire conditions. The sizes of the protected secondary edge beams were varied to study the effect of beam stiffness on the fire behaviour of the assemblies. …”
    Get full text
    Get full text
    Journal Article
  12. 252

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  13. 253

    Can't Hurt Me : Master Your Mind and Defy the Odds / by Goggins, David, author 655975, Storytel (Online service) 655976

    Published 2024
    “…Rising from a childhood marred by physical and emotional abuse from his father, neglect, poverty, racism, depression and being overweight, David (through sheer grit and determination), rose to become a Navy SEAL, an Army Ranger, and an Air Force Tactical Air Controller. …”
    Get full text
    software, multimedia
  14. 254

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  15. 255
  16. 256
  17. 257

    Environmental audit in Singapore by Chua, Boon Hua

    Published 2015
    “…In addition, neither the public nor firms are willing to bear the costs of environmental audit.…”
    Get full text
    Final Year Project (FYP)
  18. 258
  19. 259

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  20. 260

    Delving deeper into the whorl of flower segmentation by Nilsback, M, Zisserman, A

    Published 2009
    “…This is a challenging problem because of the sheer variety of flower classes, the variability within a class and within a particular flower, and the variability of the imaging conditions – lighting, pose, foreshortening, etc.…”
    Journal article