Books on the topic 'Obfuscations'

To see the other types of publications on this topic, follow the link: Obfuscations.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Obfuscations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Puzzles, perplexities & obfuscations. New York: Sterling Pub. Co., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Horváth, Máté, and Levente Buttyán. Cryptographic Obfuscation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forte, Domenic, Swarup Bhunia, and Mark M. Tehranipoor, eds. Hardware Protection through Obfuscation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Waddell, Suzanne. Freedom of information: Accountability or obfuscation? Heidelberg, Victoria, Australia: Heidelberg Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1980-, Mlinarcik Theresa, ed. The offbeat--eschew obfuscation: A literary collection. East Lansing: Michigan State University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cassidy's guide to everyday etiquette (and obfuscation). New York: Alfred A. Knopf, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ellison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, Mass: National Bureau of Economic Research, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ellison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, MA: Massachusetts Institute of Technology, Dept. of Economics, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ellison, Glenn. Search, obfuscation, and price elasticities on the internet. Cambridge, MA: National Bureau of Economic Research, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Upper Saddle River, NJ: Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tyrrell, Albert E. The darkest obfuscation: The futility of facts versus fiction. Everett, Wash. (4027-C Rucker Ave. #108, Everett, 98201): A.E. Tyrell, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Jasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for software protection. Upper Saddle River, N.J: Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Practical Reverse Engineering: X86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. Indianapolis: John Wiley & Sons, Inc., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Web Application Obfuscation Wafsevasionfiltersalert Obfuscation. Syngress Publishing, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Web Application Obfuscation. Elsevier, 2011. http://dx.doi.org/10.1016/c2009-0-64335-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Burkitt, Lance. Obfuscation of Photography. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Blokdyk, Gerardus. Application Obfuscation: Second Edition. Createspace Independent Publishing Platform, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Cryptographic Obfuscation: A Survey. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection Through Obfuscation. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Bhunia, Swarup, Domenic Forte, and Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Moors, Christopher M. Truth in a Sea of Obfuscation. Creative Cosmos, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lindsay, David, Mario Heiderich, Eduardo Alberto Vela Nava, and Gareth Heyes. Web Application Obfuscation: '-/WAFs. . Evasion. . Filters//alert-'. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Local Authority Financial Reporting: Communication, Sophistry or Obfuscation. Institute of Chartered Accountants of Scotland, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Nissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Fay, Nissenbaum Helen, ed. Obfuscation: A user's guide for privacy and protest. The MIT Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Edwards, Malon. If Wishes Were Obfuscation Codes and Other Stories. Fireside Fiction Company, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Edwards, Malon. If Wishes Were Obfuscation Codes and Other Stories. Fireside Fiction Company, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Collberg, Christian, and Jasvir Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education, Limited, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nissenbaum, Helen, and Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sengupta, Anirban. Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques. Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/pbcs067e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sengupta, Anirban. Frontiers in Securing IP Cores: Forensic Detective Control and Obfuscation Techniques. Institution of Engineering & Technology, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sengupta, Anirban. Frontiers in Securing IP Cores: Forensic Detective Control and Obfuscation Techniques. Institution of Engineering & Technology, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dang, Bruce, Elias Bachaalany, and Alexandre Gazet. Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Giordano, Richard J. Ineptitude, Conformity, and Obfuscation: The Fraud of Teacher Evaluation in the Public Schools. Rowman & Littlefield Publishers, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Ineptitude, Conformity, and Obfuscation: The Fraud of Teacher Evaluation in the Public Schools. Rowman & Littlefield Publishers, Incorporated, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mlinarcik, Theresa. The Offbeat--Eschew Obfuscation: A Literary Collection (Offbeat (East Lansing, Mich.), No. 2.). Michigan State University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

MS, Lawrence Wade Johnson. The Great Obfuscation: Vol 2. 500-1599 The Christian Church and the Tares of Matthew. BookSurge Publishing, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Truck Plays : Four Plays by The Truck Project: The Backroad Homeshow, Not Winehouse, Fish, and Obfuscation. Human Head Performance Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Berenstein, Jarret. Kellyanne Conway Technique: Perfecting the Ancient Art of Delivering Half-Truths, Fake News, and Obfuscation--With a Smile. Skyhorse Publishing Company, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sansone, Nick. Lies Trickery Obfuscation : How Dysfunctional Societal Institutions and Prepossessed Intellectuals Deceive the General Public: A Post-Postmodern Commentary. John Ross Brown, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Johnson, Mr Lawrence Wade. The Great Obfuscation. The Christian Church and the Tares of Matthew 13: Vol. 1. 44 BCE to 499 CE. BookSurge Publishing, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Holt, Jennifer, and Patrick Vonderau. “Where the Internet Lives”. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039362.003.0003.

Full text
Abstract:
This chapter examines how recent depictions of data-center visibility function both as a mode of claiming corporate territory and as an obfuscation of the less picturesque dimensions of cloud infrastructure. Analyzing media infrastructure industries, such as the companies that run cloud systems, presents particular challenges for researchers. The structural convergence and functional heterogeneity of media make it difficult to apply some of the tried and true concepts in media and communication studies, such as the distinction between public and private. Using the Swedish data center as an example, the chapter then deciphers the backend of Internet architecture and data-trafficking policies, and highlights the importance of a relational perspective in understanding data centers as dynamic infrastructure nodes.
APA, Harvard, Vancouver, ISO, and other styles
46

Barrett, Chris. Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198816874.003.0001.

Full text
Abstract:
The Introduction surveys a wide range of early modern textual production—including both literary genres and professional or technical materials pertaining to cartography—in order to offer a sense of the breadth of cartographic anxieties alive in the period, and to offer a taxonomy of the kinds of anxiety (about the map’s representational insufficiency, or about its political efficacy, or about its worrying complicity in state violence) most perceptible in the epic works Chapters 1–3 treat in depth. The introduction proposes that early modern writers and readers interrogating the map’s obfuscation of its own metaphoricity, its manipulation of detail and frame, and its innovative bibliographic presentation, ended up confronting literature’s own protocols for mediating the literal and the figurative, for constructing description and imagery, and for exploiting or rejecting their own material instantiations.
APA, Harvard, Vancouver, ISO, and other styles
47

Mills, Charles W. A Time for Dignity. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780199385997.003.0012.

Full text
Abstract:
This reflection argues that ignoring—as mainstream Kantians tend to do—Kant’s own racism with respect to people of color and, correspondingly, obfuscating their radically different experience in modernity (as subpersons rather than recognized persons) only continues in a different form the disrespect historically shown to them. Drawing on Eviatar Zerubavel’s concept of “time maps,” that is “[competing] sociomental representations of the past,” it is suggested instead that we self-consciously theorize the demands of dignity for nonwhites in a framework of corrective justice—not in the “white time” of the racially privileged but in the “nonwhite time” of the racially subordinated.
APA, Harvard, Vancouver, ISO, and other styles
48

McCabe, Joshua T. American Exceptionalism Revisited. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190841300.003.0001.

Full text
Abstract:
Chapter 1 challenges the conventional wisdom on American exceptionalism in regard to tax and social policy. After setting up the puzzle and outlining why previous theories cannot explain them, it lays out the book’s main arguments in detail. First, it outlines the book’s theory of fiscalization as an obfuscation strategy. Second, it outlines a new theory of the cultural legacies of public policies. It is not, as most scholars argue, the legacy of the Poor Law that explains America’s exceptional tax credits but rather the absence of a legacy of family allowances. It argues that “logics of appropriateness,” institutionalized in policy legacies, can limit the ability of future policymakers to extend benefits to seemingly deserving target populations. The legitimacy of a policy depends not only on who is receiving it and whether it is effective but also on how they are receiving it.
APA, Harvard, Vancouver, ISO, and other styles
49

O'Brien, Julia M. Metaphorization and Other Tropes in the Prophets. Edited by Carolyn J. Sharp. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199859559.013.14.

Full text
Abstract:
Although analysis of prophetic style often draws upon general studies of Hebrew poetry, the poetics of the prophets is distinctive—traversing prose, poetry, and rhetoric. This chapter first offers a historical overview of the study of prophetic poetry, positing the distinction between rhetoric (which seeks to advance comprehension) and poetry (which is often playful and obfuscating). It then explores key features of prophetic style, including parallelism, repetition/wordplay, irony, hyperbole, and metaphor. The chapter concludes with a discussion of feminist, queer, postcolonialist, and theological assessments of prophetic tropes, arguing that the fractures of poetic wordplay and repetition caution against identifying any single authoritative “meaning” of prophetic speech.
APA, Harvard, Vancouver, ISO, and other styles
50

Parsons, Laurel, and Brenda Ravenscroft. Amy Beach, “Phantoms,” Op. 15, No. 2 (1892). Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190237028.003.0010.

Full text
Abstract:
With “Phantoms,” the second solo piano piece from her Four Sketches op. 15 (1892), American composer Amy Beach adopts a “strategic” approach to tonality that manipulates formal, harmonic, and linear closure. The analysis presented in this chapter demonstrates, through a close reading of the phrase structure, harmonic vocabulary, textures, motivic design, and voice leading of the piece, Beach’s aptitude for tonal obfuscation, which she employs to convey a sense of the epigraph she borrowed from Victor Hugo: “Toutes fragiles fleurs, sitôt que nées” (“Such fragile flowers, as soon as they are born”). The melody she constructs is indeed fragile, floating as it does over various “misharmonizations,” and including not one but two gaps in its descent from ‸5 to the tonic. By avoiding explicit melodic reference to ‸4 and ‸2 and making abundant use of registral coupling, Beach compellingly captures the ethereal quality of the flowers described by Hugo.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography