Search alternatives:
"electronic mail" » "electronic data" (Expand Search)
Showing 1 - 15 results of 15 for search '(("electronic music") OR ("electronic mail"))', query time: 0.13s Refine Results
  1. 1

    Phishing exposed / Lance James ; foreward by Joe Stewart. by James, Lance

    Published 2005
    Subjects:
    Full text (Wentworth users only)
    Electronic eBook
  2. 2

    Cya : securing exchange server 2003 & outlook web access. by Walther, Henrik

    Published 2004
    Subjects:
    Full text (Wentworth users only)
    Electronic eBook
  3. 3

    Locating publics : forms of social order in an electronic music scene / Florian Grote. by Grote, Florian

    Published 2014
    Table of Contents: “…1.4.1.The Notion of Distinction -- 1.4.2.A Calculus of the Social -- 1.4.3.Networks From Distinctions -- 1.4.4.Observing Observers -- 1.4.5.Analytical Strategy -- 1.5.Distinguishing Styles and Scenes -- 1.5.1.The Mechanism of Comparison -- 1.5.2.Differentiation -- 1.6.Economics or Art -- Lots of Music, Nearly no Sales -- 1.7.Berlin: The "Center of the Universe" for Electronic Music -- 1.7.1.Techno Music and the Berghain Mania -- 1.7.2.In the Shadow of Berghain -- 1.7.3.Music Technology Manufacturers -- 1.7.4.Hired Guns With Record Deals…”
    Full text (Wentworth users only)
    Electronic eBook
  4. 4

    Phishing exposed / Lance James ; foreward by Joe Stewart. by James, Lance

    Published 2005
    Subjects:
    Full text (Wentworth users only)
    Electronic eBook
  5. 5
  6. 6

    Understanding data communications : from fundamentals to networking / Gilbert Held. by Held, Gilbert, 1943-

    Published 2000
    Table of Contents: “…Value-added carriers and electronic mail --…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 7
  8. 8

    Computer networks / Andrew S. Tanenbaum, David J. Wetherall. by Tanenbaum, Andrew S., 1944-

    Published 2011
    Table of Contents: “…Uses of computer networks -- network hardware -- Network software -- Reference models -- Example networks -- Network standardization -- Metric units -- The theoretical basis for data communication -- Guided transmission media -- wireless transmission -- Communication satellites -- Digital modulation and multiplexing -- The public switched telephone network -- The mobile telephone system -- Cable television -- Data link layer design issues -- Error detection and correction -- Elementary data link protocols -- Sliding window protocols -- Example data link protocols -- The channel allocation problem -- Multiple access protocols -- Ethernet -- Wireless lans -- Broadband wireless -- Bluetooth -- RFID -- Data link layer switching -- Network layer design issues -- Routing algorithms -- Congestion control algorithms -- Quality of service -- Internetworking -- The network layer in the internet -- The transport service -- Elements of transport protocols -- Congestion control -- The internet transport protocols: UDP -- The internet transport protocols: TCP -- Performance issues -- Delay-tolerant networking -- DNS-The domain name system -- Electronic mail -- The world wide web -- Streaming audio and video -- Content delivery -- Cryptography -- Symmetric-key algorithms -- Public-key algorithms -- Digital signatures -- Management of public keys -- Communication security -- Authentication protocols -- Email security -- Web security -- Social issues.…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 9

    Music in the AI Era 15th International Symposium, CMMR 2021, Virtual Event, November 15–19, 2021, Revised Selected Papers / edited by Mitsuko Aramaki, Keiji Hirata, Tetsuro Kitahar...

    Published 2023
    Table of Contents: “…Music technology in the IA era -- KANSEI Informatics and Music Technology in AI Era -- On Parallelism in Music and Language: A Perspective from Symbol Emergence Systems based on Probabilistic Generative Models -- WaVAEtable Synthesis -- Deep Learning-based Music Instrument Recognition: Exploring Learned Feature Representations -- Time-span Tree Leveled by Duration of Time-span -- Evaluating AI as an Assisting Tool to Create Electronic Dance Music -- Interactive systems for music -- Suiview: A Web-based Application that Enables Users to Practice Wind Instrument Performance -- Continuous Parameter Control Using an On/Off Sensor in the Augmented Handheld Triangle -- Networked and Collaborative Musical Play Amongst Humans and Virtual Biological Agents in Locus Diffuse -- Towards an Aesthetic of Hybrid Performance Practice -- Development of Audio Descriptors Inspired by Schaefferian Criteria: a Set of Tools for Interactive Exploration of Percussive Sounds -- A Polytemporal Model for Musical Scheduling -- Interaction Strategies in Composition for Karlax and Acoustic Instruments -- Music Information Retrieval and Modeling -- Modelling Moral Traits with Music Listening Preferences and Demographics -- Classification of 1950 to 1960 Electronic Music Using the VGGish Neural Network and Random Forest -- Knowledge Transfer from Neural Networks for Speech Music Classification -- Predominant Instrument Recognition in Polyphonic Music Using Convolutional Recurrent Neural Networks -- The Matrix Profile for Motif Discovery in Audio - An Example Application in Carnatic Music -- A Rule-based Method for Implementing Implication-Realization Model -- Music and Performance Analysis -- CROCUS: Dataset of Critique Documents of Musical Performance -- A Psychoacoustic-Based Methodology for Sound Mass Music Analysis -- Musical Structure Analysis and Generation through Abstraction Trees -- Analysis of Musical Dynamics in Vocal Performances -- With Love: Electroacoustic, Audiovisual, and Telematic Music.…”
    Full text (Wentworth users only)
    Electronic eBook
  10. 10
  11. 11

    Hands on hacking / Matthew Hickey with Jennifer Arcuri. by Hickey, Matthew (Computer security expert), Arcuri, Jennifer

    Published 2020
    Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
    Full text (Wentworth users only)
    Electronic eBook
  12. 12

    Hands on hacking / Matthew Hickey with Jennifer Arcuri. by Hickey, Matthew (Computer security expert), Arcuri, Jennifer

    Published 2020
    Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
    Full text (Wentworth users only)
    Electronic eBook
  13. 13

    Virtual World Looking Glass Pictures.

    Published 2012
    Streaming video (Wentworth users only)
    Electronic Video
  14. 14

    NGN architectures, protocols, and services / Toni Janevski. by Janevski, Toni

    Published 2014
    Table of Contents: “…2.3.3 Dynamic Host Configuration Protocol2.3.4 Domain Name System; 2.3.5 ENUM; 2.3.6 IPv6 Addressing Architecture; 2.4 Internet Routing; 2.4.1 Routing Algorithms; 2.5 Client-Server Networking; 2.6 Peer-to-Peer Networking; 2.7 Best-Effort Internet Services; 2.7.1 Electronic Mail; 2.7.2 File Transfer Protocol; 2.7.3 World Wide Web; 2.7.4 Peer-to-Peer Services; 2.8 Internet Governance; References; Chapter 3 NGN Standards and Architectures; 3.1 Main Drivers to Next Generation Networks; 3.1.1 Fixed Broadband Internet Access; 3.1.2 Mobile Broadband Internet Access.…”
    Full text (Wentworth users only)
    Electronic eBook
  15. 15

    NGN architectures, protocols, and services / Toni Janevski. by Janevski, Toni

    Published 2014
    Table of Contents: “…2.3.3 Dynamic Host Configuration Protocol2.3.4 Domain Name System; 2.3.5 ENUM; 2.3.6 IPv6 Addressing Architecture; 2.4 Internet Routing; 2.4.1 Routing Algorithms; 2.5 Client-Server Networking; 2.6 Peer-to-Peer Networking; 2.7 Best-Effort Internet Services; 2.7.1 Electronic Mail; 2.7.2 File Transfer Protocol; 2.7.3 World Wide Web; 2.7.4 Peer-to-Peer Services; 2.8 Internet Governance; References; Chapter 3 NGN Standards and Architectures; 3.1 Main Drivers to Next Generation Networks; 3.1.1 Fixed Broadband Internet Access; 3.1.2 Mobile Broadband Internet Access.…”
    Full text (Wentworth users only)
    Electronic eBook