Search alternatives:
"factor" » "factors"

1
by Coffin, David
Published 2011
Apress
..., to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones...

2
by Halsey, Mike, Bettany, Andrew
Published 2015
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ...; Internal and External Compatibility Factors; Networking Factors; PC Hardware; Security Factors; Certified...

3
by Swenson, Christopher
Published 2008
Wiley Pub.
Table of Contents: ...Simple ciphers -- Number theoretical ciphers -- Factoring and discrete logarithms -- Block ciphers...

4
Published 2016
Morgan Kaufmann
Table of Contents: ... Factor Perspectives and Definitions; 3.3.2 Defining Criteria for Quality Factors; 3.3.3 Metrics...

5
by Adolph, Steve
Published 2003
Addison-Wesley
... turns out to be more difficult than they expected. One factor contributing to this difficulty...

6
by Pfeffer, Avi
Published 2016
Manning Publications Co.
Table of Contents: ... probabilistic modeling -- Modeling dynamic systems -- The three rules of probabilistic inference -- Factored...

7
by Schneier, Bruce
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ... -- Secure hardware -- Certificates and credentials -- Security tricks -- Human factor -- Part 3: Strategies...

8 Table of Contents: ...Introduction -- Randomized block designs -- Random effects models -- Multi-factor treatment designs...

9
by Pearl, Robert
Published 2015
Apress
Table of Contents: ...Fill Factor and Page SplittingFill Factor; Page Split Tracking; Common Index Issues; Index Usage...

10
by Lewis, Jonathan
Published 2006
Apress
Table of Contents: .... Simple B-tree access -- Ch. 5. The clustering factor -- Ch. 6. Selectivity issues -- Ch. 7. Histograms...

11
by Halsey, Mike
Published 2016
Apress
...Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you're...

12
by Friedman, Mark
Published 2002
O'Reilly
... central factor in the decisions you make, performance considerations loom large and continue to play...

13
by Halsey, Mike
Published 2021
Apress L. P.

14
by McAndrew, Alasdair
Published 2012
CRC Press
Table of Contents: .... Public-key cryptosystems based on factoring; Chapter 6. Public-key cryptosystems based on logarithms...

15
by Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Table of Contents: ... -- Culture and human factors -- Legal and compliance -- Assurance and cyber risk management -- Information...

16
by Balmain, David
Published 2008
O'Reilly Media
Table of Contents: ... Performance; Indexing Parameters; :merge_factor; :max_buffered_docs; :max_merged_docs; :max_field_length...

17
by Linoff, Gordon
Published 2008
Wiley Pub.
Table of Contents: ...: Factors Affecting Survival: The What and Why of Customer Tenure -- What Factors Are Important and When...

18
by Schroeder, Jordan
Published 2017
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ...; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness...

19
by Harrop, Jon D.
Published 2008
John Wiley
Table of Contents: ...♯ -- Imperative programming -- Functional programming -- Program structure. Nesting -- Factoring -- Modules...

20
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
..."Using the factor analysis of information risk (FAIR) methodology developed over ten years...