Mobile platforms operate under fundamentally different trust assumptions than we relied on for web security. Your mobile ...
Security firm Mandiant has released a database that allows any administrative password protected by Microsoft’s NTLM.v1 hash algorithm to be hacked in an attempt to nudge users who continue using the ...
second edition of this book differs from the first in many respects. The number of pages has been increased from 188 to 348, and the explanatory matter is now in both German and English. There are now ...
I am trying to run the client_server_editing.html: a client-server replicated setup that also enables editing, where edits from multiple clients are applied in ...
Your browser does not support the audio element. A data table is one of the core parts of any modern data-driven web application. This UI element, also known as a ...
THE new I.B.M. Automatic Sequence Controlled Calculator at Harvard was recently described in Nature (158, 567; 1946). The volume now before us contains the first of a series of tables produced by the ...
IIIF provides researchers rich metadata and media viewing options for comparison of works across cultural heritage collections. Visit the IIIF page to learn more. In the mid-twentieth century, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results