Showing 401 - 420 results of 1,735 for search '(((hone OR ((pdone OR prone) OR pdone)) OR honey) OR (hon OR (boon OR book)))'s', query time: 0.17s Refine Results
  1. 401
  2. 402
  3. 403
  4. 404
  5. 405
  6. 406
  7. 407
  8. 408
  9. 409
  10. 410
  11. 411
  12. 412
  13. 413
  14. 414
  15. 415
  16. 416

    GROUND IMPROVEMENT AND STRUCTURAL DESIGN APPLICATIONS IN GEOTECHNICAL ENGINEERING / by Siti Norafida Jusoh, 1983-, editor 603312, Nor Zurairahetty Mohd. Yunus, editor 626642, Siti Norafida Jusoh, 1983-, contributor 603312, Nor Zurairahetty Mohd. Yunus, contributor 626642, Abideen Adekunle Ganiyu, 1978-, contributor 603119, Afikah Rahim, contributor 654180, Ahmad Safuan A. Rashid, contributor 616987, Aida Batrisyia Jasni, 1993-, contributor 606218, Aminaton Marto, contributor 190407, Azman Kassim, contributor 620781, Chan, Jia Ying, 1987-, contributor 506866, Dayang Zulaika Abang Hasbollah, 1988-, contributor 615329, Dayangku Salma Awang Ismail, 1982-, contributor 636878, Fauziah Kasim, contributor 241621, Hisham Mohamad, contributor 384495, Hossein Moayedi, contributor 609147, Kamarudin Ahmad, contributor 377360, Khairun Nissa Mat Said, 1988-, contributor 507079, Lee Pier Tien, contributor, Lim, Boon Lin, 1988-, contributor 593021, Mark Ruben Anak Upom, 1993-, contributor 610463, Mohammed Ridzuan Jahidin, 1970-, contributor 285467, Mohd. Hanim Osman, contributor 603120, Mohd. Nur Asmawisham Alel, 1975-, contributor 646246, Muhammad Irfan Shahrin, 1991-, contributor 568606, Nazri Ali, contributor 182241, Norazirah Abdul Aziz, contributor, Ramli Nazir, contributor 611019, Rini Asnida Abdullah, contributor 236435, Sitti Asmah Hassan, contributor 447793, Tan Yean Chin, contributor 200382, Yamusa Bello Yamusa, 1982-, contributor 624102, Yong, Chin Yung, 1988-, contributor 547872

    Published 2024
    text
  17. 417

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills. …”
    Get full text
    Get full text
    software, multimedia
  18. 418

    SUPERHERO OF LOVE : HEAL YOUR BROKEN HEART & THEN GO SAVE THE WORLD / by Fonger, Bridget, 1962-, author 655765

    Published 2019
    “…Readers will develop and hone their powers of Super Sight, Super Hearing, Super Humility, Super Self-Love, and Super Alignment to build their connection to their own hearts, the ultimate source of love in their lives…”
    text
  19. 419

    CASTERS OF EVERVILLE / by Yap, Cherilyn, author 655829, Ikram Wazir, editor 655732

    Published 2024
    “…Wyn, a demon fairy with a heart of gold, is accused of a mysterious illness that spreads across the small town of Everville. Honey, his childhood friend, is determined to find a cure and put her life on the line in order to save her friend. …”
    text
  20. 420

    What is formal verification without specifications? A survey on mining LTL specifications by Neider, D, Roy, R

    Published 2024
    “…However, formulating specifications remains a manual task that is notoriously challenging and error-prone. To address this bottleneck in formal verification, recent research has thus focussed on automatically generating specifications for formal verification from examples of (desired and undesired) system behavior. …”
    Book section