Books on the topic 'Obfuscations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Obfuscations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Puzzles, perplexities & obfuscations. New York: Sterling Pub. Co., 1992.
Find full textHorváth, Máté, and Levente Buttyán. Cryptographic Obfuscation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.
Full textForte, Domenic, Swarup Bhunia, and Mark M. Tehranipoor, eds. Hardware Protection through Obfuscation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9.
Full textWaddell, Suzanne. Freedom of information: Accountability or obfuscation? Heidelberg, Victoria, Australia: Heidelberg Press, 2009.
Find full text1980-, Mlinarcik Theresa, ed. The offbeat--eschew obfuscation: A literary collection. East Lansing: Michigan State University Press, 2003.
Find full textCassidy's guide to everyday etiquette (and obfuscation). New York: Alfred A. Knopf, 2015.
Find full textEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, Mass: National Bureau of Economic Research, 2004.
Find full textEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, MA: Massachusetts Institute of Technology, Dept. of Economics, 2004.
Find full textEllison, Glenn. Search, obfuscation, and price elasticities on the internet. Cambridge, MA: National Bureau of Economic Research, 2004.
Find full textJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Upper Saddle River, NJ: Addison-Wesley, 2009.
Find full textTyrrell, Albert E. The darkest obfuscation: The futility of facts versus fiction. Everett, Wash. (4027-C Rucker Ave. #108, Everett, 98201): A.E. Tyrell, 1998.
Find full textJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for software protection. Upper Saddle River, N.J: Addison-Wesley, 2009.
Find full textPractical Reverse Engineering: X86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. Indianapolis: John Wiley & Sons, Inc., 2014.
Find full textWeb Application Obfuscation Wafsevasionfiltersalert Obfuscation. Syngress Publishing, 2010.
Find full textWeb Application Obfuscation. Elsevier, 2011. http://dx.doi.org/10.1016/c2009-0-64335-x.
Full textBurkitt, Lance. Obfuscation of Photography. Independently Published, 2020.
Find full textBlokdyk, Gerardus. Application Obfuscation: Second Edition. Createspace Independent Publishing Platform, 2018.
Find full textCryptographic Obfuscation: A Survey. Springer, 2020.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection Through Obfuscation. Springer, 2017.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2018.
Find full textBhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2017.
Find full textMoors, Christopher M. Truth in a Sea of Obfuscation. Creative Cosmos, 2016.
Find full textLindsay, David, Mario Heiderich, Eduardo Alberto Vela Nava, and Gareth Heyes. Web Application Obfuscation: '-/WAFs. . Evasion. . Filters//alert-'. Elsevier Science & Technology Books, 2011.
Find full textLocal Authority Financial Reporting: Communication, Sophistry or Obfuscation. Institute of Chartered Accountants of Scotland, 1991.
Find full textNissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.
Find full textNissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.
Find full textFay, Nissenbaum Helen, ed. Obfuscation: A user's guide for privacy and protest. The MIT Press, 2015.
Find full textEdwards, Malon. If Wishes Were Obfuscation Codes and Other Stories. Fireside Fiction Company, 2022.
Find full textNissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2016.
Find full textEdwards, Malon. If Wishes Were Obfuscation Codes and Other Stories. Fireside Fiction Company, 2022.
Find full textCollberg, Christian, and Jasvir Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education, Limited, 2009.
Find full textNissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.
Find full textSengupta, Anirban. Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques. Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/pbcs067e.
Full textSengupta, Anirban. Frontiers in Securing IP Cores: Forensic Detective Control and Obfuscation Techniques. Institution of Engineering & Technology, 2020.
Find full textSengupta, Anirban. Frontiers in Securing IP Cores: Forensic Detective Control and Obfuscation Techniques. Institution of Engineering & Technology, 2019.
Find full textDang, Bruce, Elias Bachaalany, and Alexandre Gazet. Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation. Wiley & Sons, Incorporated, John, 2014.
Find full textGiordano, Richard J. Ineptitude, Conformity, and Obfuscation: The Fraud of Teacher Evaluation in the Public Schools. Rowman & Littlefield Publishers, 2019.
Find full textIneptitude, Conformity, and Obfuscation: The Fraud of Teacher Evaluation in the Public Schools. Rowman & Littlefield Publishers, Incorporated, 2019.
Find full textMlinarcik, Theresa. The Offbeat--Eschew Obfuscation: A Literary Collection (Offbeat (East Lansing, Mich.), No. 2.). Michigan State University Press, 2003.
Find full textMS, Lawrence Wade Johnson. The Great Obfuscation: Vol 2. 500-1599 The Christian Church and the Tares of Matthew. BookSurge Publishing, 2006.
Find full textTruck Plays : Four Plays by The Truck Project: The Backroad Homeshow, Not Winehouse, Fish, and Obfuscation. Human Head Performance Group, 2014.
Find full textBerenstein, Jarret. Kellyanne Conway Technique: Perfecting the Ancient Art of Delivering Half-Truths, Fake News, and Obfuscation--With a Smile. Skyhorse Publishing Company, Incorporated, 2017.
Find full textSansone, Nick. Lies Trickery Obfuscation : How Dysfunctional Societal Institutions and Prepossessed Intellectuals Deceive the General Public: A Post-Postmodern Commentary. John Ross Brown, 2022.
Find full textJohnson, Mr Lawrence Wade. The Great Obfuscation. The Christian Church and the Tares of Matthew 13: Vol. 1. 44 BCE to 499 CE. BookSurge Publishing, 2005.
Find full textHolt, Jennifer, and Patrick Vonderau. “Where the Internet Lives”. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039362.003.0003.
Full textBarrett, Chris. Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198816874.003.0001.
Full textMills, Charles W. A Time for Dignity. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780199385997.003.0012.
Full textMcCabe, Joshua T. American Exceptionalism Revisited. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190841300.003.0001.
Full textO'Brien, Julia M. Metaphorization and Other Tropes in the Prophets. Edited by Carolyn J. Sharp. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199859559.013.14.
Full textParsons, Laurel, and Brenda Ravenscroft. Amy Beach, “Phantoms,” Op. 15, No. 2 (1892). Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190237028.003.0010.
Full text