Nick

Results: 6109



#Item
861

“I line it up – bang, straight in the nick” MY GAME: In the first of a three-part series, Australian

Add to Reading List

Source URL: www.squashplayer.co.uk

Language: English - Date: 2015-09-03 10:01:13
    862

    Leveraging SDN Layering to Systematically Troubleshoot Networks Brandon Heller† Colin Scott∗ Nick McKeown† Scott Shenker∗

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2013-07-08 15:45:54
      863Economy / Academia / Prevention / Security engineering / Privacy / Internet privacy / Password / Authentication / Software design pattern / Security Patterns / Pattern language / Consumer privacy

      Privacy Design Patterns and Anti-Patterns Patterns Misapplied and Unintended Consequences Nick Doty Mohit Gupta

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2013-07-23 08:07:23
      864Software / Computing / Fingerprinting algorithms / Internet privacy / Cross-platform software / Web design / Cloud clients / Device fingerprint / HTTP cookie / Fingerprint / Tor / Web typography

      FPDetective: Dusting the Web for Fingerprinters Gunes Acar1 , Marc Juarez1,2 , Nick Nikiforakis3 , Claudia Diaz1 , Seda Gürses1,4 , Frank Piessens3 and Bart Preneel1 1 KU Leuven, Dept. of Electrical Engineering (ESAT),

      Add to Reading List

      Source URL: securehomes.esat.kuleuven.be

      Language: English - Date: 2013-10-31 05:41:24
      865

      NICK SANTANIELLONew York, NY | San Francisco, CA PDF

      Add to Reading List

      Source URL: www.nicksantan.com

      Language: English - Date: 2015-09-23 22:20:48
        866

        COLOUR MANAGEMENT COLOUR COMPLEXITIES The Need for Specialist Software in the Digital Workflow for Decorative Print By Nick Langford, chief executive, AVA CAD/

        Add to Reading List

        Source URL: d23eri2gz1bd5i.cloudfront.net

        Language: English - Date: 2015-04-02 10:28:43
          867Computing / Internet / Computer security / Internet privacy / Computer network security / Computer networking / Proxy servers / Internet protocols / Tor / Proxy list / Anonymizer / Open proxy

          Design of a blocking-resistant anonymity system Roger Dingledine and Nick Mathewson , Tor Tech ReportNovember 2006

          Add to Reading List

          Source URL: research.torproject.org

          Language: English - Date: 2012-08-31 06:11:24
          868

          Secure Modular Password Authentication for the Web using Channel Bindings Mark Manulis, Douglas Stebila, Nick Denham SSR 2014@RHUL

          Add to Reading List

          Source URL: ssr2015.com

          Language: English - Date: 2015-06-22 06:35:15
            869

            Infrared(&(Airborne(Astronomy( Nick(Veronico(•(SOFIA(Press(Officer(( nveronico@sofia.usra.edu(•((650)(604G4589( Themes:(

            Add to Reading List

            Source URL: www.sofia.usra.edu

            Language: English - Date: 2014-12-08 17:13:17
              870

              The Trivial Program “yes” Nick Montfort January 2012 TROPE–12–01

              Add to Reading List

              Source URL: nickm.com

              Language: English - Date: 2014-10-13 23:11:49
                UPDATE