Search alternatives:
pol » pool, poly, pole
polele » poolele, polyele, poleele, polelle, polese, polece
poles » pooles, polyes, polees, roles, poses, holes
poolle » poole
woolle » woollen, woolley, woollet
poolla » prolla, doolla, moolla
hole » home, hope, holy

1
by Koziol, Jack
Published 2004
Wiley Pub.
..."Examines where security holes come from, how to discover them, how hackers exploit them and take...

2
by Anley, Chris
Published 2007
Wiley Pub.
..., features 40 percent new content on how to find security holes in any operating system or applicationNew...

4
by Adolph, Steve
Published 2003
Addison-Wesley

5
by Broniek, Przemysław
Published 2015
Springer International Publishing
...(A) and SysPolSat(A), in which equations are built out of terms or polynomials, respectively...

6
by Esakkirajan, S., Veerakumar, T., N Subudhi, Badri
Published 2024
Springer Nature Singapore
Table of Contents: ... 5: Transforms.-CHAPTER 6: Filter Design using Pole-Zero Placement Method-CHAPTER 7: FIR Filter...

7
by Emerick, Chas, Carper, Brian, Grand, Christophe
Published 2012
O'Reilly
Table of Contents: ...Down the rabbit hole -- Functional programming -- Collections and data structures -- Concurrency...

8
by Ballad, Tricia
Published 2009
Addison-Wesley
Table of Contents: ...: Security Is a Server Issue and Other Myths Part II: Is That Hole Really Big Enough to Drive a Truck Through...

10
Published 2023
Packt Publishing

11
by Pacchierotti, Claudio
Published 2015
Springer International Publishing
Table of Contents: ... -- Peg-in-Hole in Simulated and Real Scenarios -- Remote Palpation Using the Da Vinci Surgical System...

12
Published 2019
Springer International Publishing
... also featured invited talks by Jaco van de Pol (Aarhus University, and Twente University), jointly...

13
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Aniketos: Challenges and Results -- Ubiquitous Participation Platform for POLicyMaking (UbiPOL...

14
Published 2002
Springer Berlin Heidelberg
... of their times: Apache filled a hole in the then emerging Web, at a time no platform vendor really knew how...

15
by Herrmann, Frank
Published 2018
Springer Fachmedien Wiesbaden
... Selbststudium Der Autor Dr. rer. pol. Frank Herrmann ist Diplom-Kaufmann sowie Berater für SAP ERP 6.0 Vertrieb...

16
by Jain, Shashank Mohan
Published 2020
Apress
... takes you down the rabbit hole to discover what lies below the API. You’ll go on a journey...

17
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... in the Spineless Tagless G-Machine: An Implementation of Resumable Black-Holes -- Towards a Haskell/Java Connection...

18
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Encounters with a Black Hole or Explorations and Gatherings in Dangerous Graphs -- Fun with Sub-linear Time...

19
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... Behavioural Lambda Models -- A Unifying Approach to Recursive and Co-recursive Definitions -- Holes...

20
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... -- Beautiful Imperative Code: A Functional Ace in the Hole for Imperative Programmers...