Showing 161 - 180 results of 2,715 for search '(((hone OR ((done OR (pbhone OR ((phoney OR honey) OR pbbhoney))) OR phone)) OR borne) OR book)'s', query time: 0.22s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164
  5. 165

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8th edition by Stallings, Wiliam

    Published 2024
    “…The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. …”
    Book
  6. 166

    Workshop on Strategies for Successful Internet Publishing : 26-27 April 2000, Kuala Lumpur : [workshop introduction]

    Published 2008
    Subjects: “…DRNTU::Library and information science::Book industries and trade…”
    Get full text
    Get full text
    Conference Paper
  7. 167
  8. 168
  9. 169
  10. 170

    Love and Other Words / by Lauren, Christina, author 593883, Little, Brown Book Group (Online service) 655987

    Published 2018
    “…Told in alternating timelines between Then and Now, teenage Elliot and Macy grow from friends to much more—spending weekends and lazy summers together in a house outside of San Francisco reading books, sharing favorite words, and talking through their growing pains and triumphs. …”
    Get full text
    software, multimedia
  11. 171
  12. 172
  13. 173
  14. 174

    Healthcare - Solutions for a Better World ? by Datta, Shoumen

    Published 2024
    Subjects: “…Healthcare, Digital Health, Vaccines, Immunization, Remote Monitoring, SmartPhones in Diagnostics, Molecular Diagnostics, Vital Sign Monitoring, Neurodegenerative Diseases, NeuroCognitive Disorders, Data Analytics, Predictive Analytics…”
    Get full text
    Presentation
  15. 175

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. …”
    Get full text
    Get full text
    software, multimedia
  16. 176

    Development of applications for mobile devices I by Panganiban, Nicole Dale

    Published 2016
    “…Simple tasks can now be done with just the use of a smart phone with connection to a wireless internet connection. …”
    Get full text
    Final Year Project (FYP)
  17. 177

    SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD / by Fonger, Bridget, 1962-, author 655765

    Published 2019
    “…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
    text
  18. 178

    Portable mobile surveillance and detection by Tan, Weishen

    Published 2016
    “…It is able to capture image, record video, detect motion and live stream. All the control is done remotely through SMS. User is able to view all capture media through Dropbox or the surveillance phone. …”
    Get full text
    Final Year Project (FYP)
  19. 179

    Mobile app to play team-building games by Jie, Dai

    Published 2019
    “…However, it is uncommon for team building to be done by using smartphones. In this growing era of electronics, it is inevitable for humans to be more reliant and dependant on the use of a smart phone application. …”
    Get full text
    Final Year Project (FYP)
  20. 180

    AudiCeive : mobile application to recognize unique audio frequencies using acoustic fingerprinting by Saraswathi Karuppiah

    Published 2017
    “…How many of them would be interested to know more about those places at such a young age, let alone finish reading the book which does not earn their attention? However if we place a phone in their hand together with a movie clip playing and let them see the phone returning a few details about the place they just saw on screen, things take a different angle. …”
    Get full text
    Final Year Project (FYP)