Libros sobre el tema "Obfuscations"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Obfuscations".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Puzzles, perplexities & obfuscations. New York: Sterling Pub. Co., 1992.
Buscar texto completoHorváth, Máté y Levente Buttyán. Cryptographic Obfuscation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-98041-6.
Texto completoForte, Domenic, Swarup Bhunia y Mark M. Tehranipoor, eds. Hardware Protection through Obfuscation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9.
Texto completoWaddell, Suzanne. Freedom of information: Accountability or obfuscation? Heidelberg, Victoria, Australia: Heidelberg Press, 2009.
Buscar texto completo1980-, Mlinarcik Theresa, ed. The offbeat--eschew obfuscation: A literary collection. East Lansing: Michigan State University Press, 2003.
Buscar texto completoCassidy's guide to everyday etiquette (and obfuscation). New York: Alfred A. Knopf, 2015.
Buscar texto completoEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, Mass: National Bureau of Economic Research, 2004.
Buscar texto completoEllison, Glenn. Search, obfuscation, and price elasticities on the Internet. Cambridge, MA: Massachusetts Institute of Technology, Dept. of Economics, 2004.
Buscar texto completoEllison, Glenn. Search, obfuscation, and price elasticities on the internet. Cambridge, MA: National Bureau of Economic Research, 2004.
Buscar texto completoJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Upper Saddle River, NJ: Addison-Wesley, 2009.
Buscar texto completoTyrrell, Albert E. The darkest obfuscation: The futility of facts versus fiction. Everett, Wash. (4027-C Rucker Ave. #108, Everett, 98201): A.E. Tyrell, 1998.
Buscar texto completoJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for software protection. Upper Saddle River, N.J: Addison-Wesley, 2009.
Buscar texto completoPractical Reverse Engineering: X86, x64, ARM, Windows Kernel, reversing tools, and obfuscation. Indianapolis: John Wiley & Sons, Inc., 2014.
Buscar texto completoWeb Application Obfuscation Wafsevasionfiltersalert Obfuscation. Syngress Publishing, 2010.
Buscar texto completoWeb Application Obfuscation. Elsevier, 2011. http://dx.doi.org/10.1016/c2009-0-64335-x.
Texto completoBurkitt, Lance. Obfuscation of Photography. Independently Published, 2020.
Buscar texto completoBlokdyk, Gerardus. Application Obfuscation: Second Edition. Createspace Independent Publishing Platform, 2018.
Buscar texto completoCryptographic Obfuscation: A Survey. Springer, 2020.
Buscar texto completoBhunia, Swarup, Domenic Forte y Mark M. Tehranipoor. Hardware Protection Through Obfuscation. Springer, 2017.
Buscar texto completoBhunia, Swarup, Domenic Forte y Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2018.
Buscar texto completoBhunia, Swarup, Domenic Forte y Mark M. Tehranipoor. Hardware Protection through Obfuscation. Springer, 2017.
Buscar texto completoMoors, Christopher M. Truth in a Sea of Obfuscation. Creative Cosmos, 2016.
Buscar texto completoLindsay, David, Mario Heiderich, Eduardo Alberto Vela Nava y Gareth Heyes. Web Application Obfuscation: '-/WAFs. . Evasion. . Filters//alert-'. Elsevier Science & Technology Books, 2011.
Buscar texto completoLocal Authority Financial Reporting: Communication, Sophistry or Obfuscation. Institute of Chartered Accountants of Scotland, 1991.
Buscar texto completoNissenbaum, Helen y Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.
Buscar texto completoNissenbaum, Helen y Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.
Buscar texto completoFay, Nissenbaum Helen, ed. Obfuscation: A user's guide for privacy and protest. The MIT Press, 2015.
Buscar texto completoEdwards, Malon. If Wishes Were Obfuscation Codes and Other Stories. Fireside Fiction Company, 2022.
Buscar texto completoNissenbaum, Helen y Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2016.
Buscar texto completoEdwards, Malon. If Wishes Were Obfuscation Codes and Other Stories. Fireside Fiction Company, 2022.
Buscar texto completoCollberg, Christian y Jasvir Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education, Limited, 2009.
Buscar texto completoNissenbaum, Helen y Finn Brunton. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, 2015.
Buscar texto completoSengupta, Anirban. Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques. Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/pbcs067e.
Texto completoSengupta, Anirban. Frontiers in Securing IP Cores: Forensic Detective Control and Obfuscation Techniques. Institution of Engineering & Technology, 2020.
Buscar texto completoSengupta, Anirban. Frontiers in Securing IP Cores: Forensic Detective Control and Obfuscation Techniques. Institution of Engineering & Technology, 2019.
Buscar texto completoDang, Bruce, Elias Bachaalany y Alexandre Gazet. Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation. Wiley & Sons, Incorporated, John, 2014.
Buscar texto completoGiordano, Richard J. Ineptitude, Conformity, and Obfuscation: The Fraud of Teacher Evaluation in the Public Schools. Rowman & Littlefield Publishers, 2019.
Buscar texto completoIneptitude, Conformity, and Obfuscation: The Fraud of Teacher Evaluation in the Public Schools. Rowman & Littlefield Publishers, Incorporated, 2019.
Buscar texto completoMlinarcik, Theresa. The Offbeat--Eschew Obfuscation: A Literary Collection (Offbeat (East Lansing, Mich.), No. 2.). Michigan State University Press, 2003.
Buscar texto completoMS, Lawrence Wade Johnson. The Great Obfuscation: Vol 2. 500-1599 The Christian Church and the Tares of Matthew. BookSurge Publishing, 2006.
Buscar texto completoTruck Plays : Four Plays by The Truck Project: The Backroad Homeshow, Not Winehouse, Fish, and Obfuscation. Human Head Performance Group, 2014.
Buscar texto completoBerenstein, Jarret. Kellyanne Conway Technique: Perfecting the Ancient Art of Delivering Half-Truths, Fake News, and Obfuscation--With a Smile. Skyhorse Publishing Company, Incorporated, 2017.
Buscar texto completoSansone, Nick. Lies Trickery Obfuscation : How Dysfunctional Societal Institutions and Prepossessed Intellectuals Deceive the General Public: A Post-Postmodern Commentary. John Ross Brown, 2022.
Buscar texto completoJohnson, Mr Lawrence Wade. The Great Obfuscation. The Christian Church and the Tares of Matthew 13: Vol. 1. 44 BCE to 499 CE. BookSurge Publishing, 2005.
Buscar texto completoHolt, Jennifer y Patrick Vonderau. “Where the Internet Lives”. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039362.003.0003.
Texto completoBarrett, Chris. Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198816874.003.0001.
Texto completoMills, Charles W. A Time for Dignity. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780199385997.003.0012.
Texto completoMcCabe, Joshua T. American Exceptionalism Revisited. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190841300.003.0001.
Texto completoO'Brien, Julia M. Metaphorization and Other Tropes in the Prophets. Editado por Carolyn J. Sharp. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199859559.013.14.
Texto completoParsons, Laurel y Brenda Ravenscroft. Amy Beach, “Phantoms,” Op. 15, No. 2 (1892). Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190237028.003.0010.
Texto completo