John

Results: 121231



#Item
61Religion / Christianity / Bible / Biblical exegesis / Gospel of Mark / Jesus / Pharisees / New Testament / Paul the Apostle / Epistle to the Philippians / Matthew the Apostle / Gospel of Matthew

Start With Paul And Then You Can See How Matthew and John Are So Differ- 7 No Traditional Reading Order of the New Testament Start With Paul And Then You Can See How Matthew and John Are So Different

Add to Reading List

Source URL: www.jesuswordsonly.com

Language: English - Date: 2010-05-14 09:26:07
62Computing / Information and communications technology / Internet architecture / Information Age / Firewall software / Internet censorship / Computer network security / Great Firewall / Content-control software / Localhost / Firewall / Router

Inferring Mechanics of Web Censorship Around the World John-Paul Verkamp Minaxi Gupta School of Informatics and Computing, Indiana University

Add to Reading List

Source URL: www.usenix.org

Language: English
63Economy / Money / Finance / Editorial cartoonist / Loan / Debt / AAEC

Is debt scaring you away from college? Talking Points John Rose, Ogden Newspapers / Courtesy of AAEC Between the lines

Add to Reading List

Source URL: nieonline.com

Language: English - Date: 2018-05-20 09:23:09
64Law / Economy / Terms of service / Marc Rotenberg / Privacy / Digital rights / Human rights / Internet privacy / Consumer privacy / John Thune / Medical privacy / Electronic Privacy Information Center

September 24, 2018 The Honorable John Thune, Chairman The Honorable Bill Nelson, Ranking Member U.S. Senate Committee on Commerce, Science, and Transportation 512 Dirksen Senate Office Building Washington, DC 20510

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2018-09-24 14:29:22
65Computing / Computer programming / Software engineering / Functional languages / High-level programming languages / Computer access control / Object-capability model / JavaScript / Heap / Topological space / Monad / Caja project

Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2010-03-08 04:28:13
66

CLARK COUNTY BOARD OF ELECTIONS Board Members  Sue DeVoe Allen, Chairperson  Lynda Smith  David Hartley  John Pickarski Director  Jason Baker Deputy Director  Amber Lopez November 14, 2017

Add to Reading List

Source URL: clark.ohioboe.com

- Date: 2018-08-15 15:35:14
    67

    Board Members: Sue DeVoe Allen, Chairperson ▪ Lynda Smith David Hartley ▪ John Pickarski Director: Jason Baker ▪ Deputy Director: Amber Lopez May 16, 2018

    Add to Reading List

    Source URL: clark.ohioboe.com

    - Date: 2018-08-15 15:32:20
      68Cryptography / Multivariate cryptography / Hidden Field Equations / Equation / Field extension / XSL attack

      Square, a New Multivariate Encryption Scheme Crystal Clough1 , John Baena1,2 , Jintai Ding1,4 , Bo-Yin Yang3 , and Ming-shing Chen3 1 Department of Mathematical Sciences,

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2011-03-20 04:03:42
      69

      Board Members: Sue DeVoe Allen, Chairperson ▪ Lynda Smith David Hartley ▪ John Pickarski Director: Jason Baker ▪ Deputy Director: Amber Lopez May 21, 2018

      Add to Reading List

      Source URL: clark.ohioboe.com

      - Date: 2018-08-15 15:31:53
        70Computer security / Computing / Compiler construction / Computer programming / Software engineering / Return-oriented programming / Control-flow integrity / Code reuse / Control flow graph / Program analysis / Data-flow analysis / Cyberattack

        Poster: CRAFTED: Code Reuse Analysis for Trusted and Effective Defense Ethan Johnson Tianqin Zhao John Criswell

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-05-14 00:24:54
        UPDATE