Sherry

Results: 2412



#Item
491Electromagnetic spectrum / Ultraviolet / Space telescopes

UCRL-PROC[removed]Experimental performance of EUV multilayer flight mirrors for AIA Regina Soufli1*, David L. Windt2†, Jeff C. Robinson1, Sherry L. Baker1, Eberhard Spiller1, Franklin J. Dollar3, Andrew L. Aquila3, Eri

Add to Reading List

Source URL: hmi.stanford.edu

Language: English - Date: 2006-06-19 20:36:53
492Victimology / Ethics / Labour law / Victimisation / Behavior / Behavioural sciences / Peer victimization / Abuse / Bullying / Social psychology

Treatment Models for Poly-victimization Summary of Key Points Victoria Banyard, Sherry Hamby, and Heather Turner Poly-victimization is defined as experiencing multiple, different types of victimization, such as physical

Add to Reading List

Source URL: www.nationalcac.org

Language: English - Date: 2014-09-10 16:19:53
493Traceroute / Router / Transmission Control Protocol / Ping / Internet standards / Computer network security / Routing / IP in IP / IP address spoofing / Computing / Network architecture / Internet

Applications of the IP Timestamp Option to Internet Measurement Honors Thesis Presentation Justine Sherry March 2010

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2010-08-10 16:37:22
494Ethics / Bullying / Sexual abuse / Social psychology / Victimology / Child abuse / Victimisation / Child sexual abuse / Violence / Criminology / Medicine / Abuse

Prevention of Poly-victimization: Comprehensive and Connected Approaches Summary of Key Points Victoria Banyard, Sherry Hamby, and Heather Turner Exposure to many different types of trauma across various settings in a ch

Add to Reading List

Source URL: www.nationalcac.org

Language: English - Date: 2014-06-04 15:13:38
495Human behavior / Social psychology / Bullying / Victimology / Sexual abuse / Victimisation / Child sexual abuse / Domestic violence / Child abuse / Ethics / Abuse / Behavior

Poly-victimization: Childhood Exposure to Multiple Forms of Victimization Heather Turner, Sherry Hamby, & Victoria Banyard We know from clinical and research practice that far too many children are exposed to abuse, viol

Add to Reading List

Source URL: www.nationalcac.org

Language: English - Date: 2014-09-10 16:19:51
496Boilers / Plumbing / Water heating / Mechanical engineering / Technology / Chemistry / Heater / Natural gas / Propane / Fuel gas / Home appliances / Heating /  ventilating /  and air conditioning

How to Assess Poly-victimization in Your Work: Approaches & Tools Summary of Key Points Sherry Hamby, Heather Turner, and Victoria Banyard Poly-victimization refers to experiencing multiple different types of victimizati

Add to Reading List

Source URL: www.nationalcac.org

Language: English - Date: 2014-09-10 16:19:51
497Videotelephony / Internet / Middlebox / Firewall / Application firewall / Cloud computing / Network address translation / Gateway / Voice over IP / Computer network security / Computing / Network architecture

Making Middleboxes Someone Else’s Problem: Network Processing as a Cloud Service Justine Sherry Shaddi Hasan

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2012-06-11 17:45:35
498Top Chef / Charcuterie / Confit / Garde manger / Occitan cuisine / Lardon / Steak / Duck confit / Food and drink / Meat / French cuisine

cbbbbbbbbbbbbbbbbba HORS D’ŒUVRES ONION SOUP GRATINÉE MIXED FIELD GREENS in a sherry vinaigrette BALTHAZAR SALAD with haricots verts,

Add to Reading List

Source URL: balthazarny.com

Language: English - Date: 2014-11-10 15:16:40
499Traceroute / Computer network security / Timestamp / Transmission Control Protocol / Ping / IP address spoofing / Internet Protocol / Communications protocol / Computing / System software / Data

Applications of the IP Timestamp Option to Internet Measurement Justine Sherry A senior thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2010-08-10 16:37:20
500Computer security / Middlebox / Snort / Deep packet inspection / ANts P2P / Intrusion detection system / HTTP Secure / Computer network security / Computing / Software

BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 09:24:18
UPDATE