Search alternatives:
swash » awash
slash » flash, clash, slas
swath » swat, spath
spam » span

201
by Krum, Cindy
Published 2010
Que
Table of Contents: ... mobile marketing with on- and offline marketing -- Mobile E-commerce -- Mobile marketing privacy, spam...

202
by Smith, Richard
Published 2020
Pluto Press
... in China and the US, will suffice to slash greenhouse gas emissions enough to prevent climate catastrophe."--...

203
by Johnson, Ilana
Published 2021
University Press of Colorado
... thematic approach to a broader swath of prehistory. Chapters on various time periods use a comparable scale...

204
by Solomon, Michael
Published 2019
For Dummies
.... As an emerging application of blockchain technology, Ethereum attracts a wide swath of professionals ranging from...

205 Table of Contents: ... with Wide-Swath Sonar -- Anatomy of Some Atlantic Margin Sediment Slides and Some Comments on Ages...

206
Published 2024
Springer Nature Singapore
Table of Contents: ... Variations of Naive Bayes, Linear SVM, and Random Forest for Spam Detection: A Comprehensive Study...

207
by Seibel, Peter
Published 2005
Apress
Table of Contents: .... Practical : a spam filter -- Ch. 24. Practical : parsing binary files -- Ch. 25. Practical : an ID3 parser...

208
by Glenn, Walter J.
Published 2007
Microsoft Press
Table of Contents: ... Server 2007 -- 19. Exchange Server security basics -- 20. Antivirus and anti-spam -- 21. Securing...

209
by Glenn, Walter J.
Published 2008
Microsoft Press
Table of Contents: .... Antivirus and Anti-spam -- 21. Securing Exchange Server 2007 Messages -- pt. VII. Clients -- 22. Overview...

210
by Graham, Paul
Published 2004
O'Reilly
Table of Contents: ... for spam: till recently most experts thought spam filtering wouldn't work. This proposal changed...

211
by Massé, Mark
Published 2012
O'Reilly
Table of Contents: ...; Chapter 2. Identifier Design with URIs; URIs; URI Format; Rule: Forward slash separator (/) must be used...

212
by Fernandez, Dan
Published 2008
O'Reilly
Table of Contents: ... Slash Commands; Before We Get Started; Variable scopes; Lua functions...

213
by Both, David P.
Published 2020
Apress
Table of Contents: ... with SSH -- 6. Routing and Firewalls -- 7. Introducing Email -- 8. Email clients -- 9. Combating Spam -- 10...

214
by Provos, Niels
Published 2007
Addison-Wesley
... network decoy, worm detection, spam prevention, and network simulation."--Jacket...

215
by Robichaux, Paul E.
Published 2013
Microsoft Press
... and anti-spam features; Unified Messaging; Microsoft Lync; Office 365; Exchange Online...

216
by Casad, Joe
Published 2003
Sams
... topics added include: wireless networking, spam control, broadband, and peer-to-peer networking...

217
by Lachos Dávila, Víctor Hugo, Cabral, Celso Rômulo Barbosa, Zeller, Camila Borelli
Published 2018
Springer International Publishing
...), the skew-slash (SSL) and the skew-contaminated normal (SCN), for example. These distributions have heavier...

218
Published 2015
Springer International Publishing
..., this volume presents a collection of papers covering a wide swath of number theory emerging from the third...

219
by Cole, Lucinda
Published 2016
University of Michigan Press
... wide historical swath of canonical early modern literary texts-William Shakespeare's Macbeth...

220
by Havens, Jerry
Published 2021
Arkansas Scholarly Editions
... fuel could vaporize and escape into the surrounding environment, resulting in a miles-wide swath...