Tomato Juice

To make tomato juice, enter a word or phrase. Alternatively, browse the top 100 queries alphabetically or by rank.

Services

Pretty print
Email
Publish
Save
Save as...
Tag
Review
Bookmark
Borrow
Renew
Download
Create RSS

A A A

Book search for authentication

6522 records were found. No more than 25 are displayed below:

  1. Novell Modular authentication service [electronic resource] : authentication software. Novell Modular authentication service [electronic resource] : authentication software. Modular authentication service Enterprise ed., Version 1.0. Orem, UT : Novell, c2000. 1 CD-ROM ; 4 3/4 in. + 1 Novell client CD-ROM (4 1/3 in.) + 1 partner guide + 1 installation and administration guide. Title from disc label. Ed. statement from installation and administration guide. Client CD-ROM (English/German) has date of April 2000. Includes ZENworks starter pack. Designed to help the user protect information on the network. Includes login factors, methods and sequences, and password, biometric, and physical device authentication. System requirements for Server: NetWare 5.0 or better; NetWare 5 Support Pack 4 or later; NDS eDirectory Upgrade on NetWare; ConsoleOne 1.2c or later. System requirements for Windows Client Workstation: Pentium Pro 200 processor or equivalent; 64MB RAM; Windows 95 Release B or later, Windows 98, or Windows NT 4.0 with Service Pack 3 or later. Computer security Software. Computer networks Security measures Software. Software. lcgft https://id.loc.gov/authorities/genreForms/gf2022026086 Novell, Inc. 7 cbc orignew 2 ncip 20 y-gencompf Acquire 1 shelf copy policy default vb23 02-23-01 vb31 2002-06-05 (rev vb27 2002-06-10) vb27 2002-06-10 vb27 2002-06-10 to BCCD LCAP batch update 2025-06-01-04:00: LCAPM-893 (Details)
  2. StartUp. Authentication / creator, Ben Ketai ; director, Timothy A. Burton ; writer, Josh Corbin. StartUp. Authentication / creator, Ben Ketai ; director, Timothy A. Burton ; writer, Josh Corbin. Authentication Start up. Authentication United States. 2018. viewing copy 1 videocassette of 1 (HDCAM SR) (42 min., 17 sec.) : sd., col. ; 1/2 in. two-dimensional moving image tdi rdacontent video v rdamedia videocassette vf rdacarrier Originally released through Crackle streaming service on November 1, 2018. Episode no. 306. Sources used: video container; Copyright catalog online; Copyright description; Wikipedia WWW site, viewed January 22, 2021. Adam Brody, Edi Gathegi, Otmara Marrero. Television crime shows. lcgft Fiction television programs. lcgft Copyright Collection (Library of Congress) DLC 0 cbc orignew u ncip 20 y-movingim LCAP batch update 2025-12-31-05:00: LCAPM-5828 qm26 2021-01-22 LCAP batch update 2025-06-02-04:00: LCAPM-1035 (Details)
  3. Speaker authentication / Qi (Peter) Li. Speaker authentication / Qi (Peter) Li. Heidelberg ; New York : Springer, c2012. xxv, 237 p. : ill. (some col.) ; 24 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier Signals and communication technology, 1860-4862 Includes bibliographical references and index. 1. Introduction -- 2. Multivariate statistical analysis and one-pass vector quantization -- 3. Principal feature networks for pattern recognition -- 4. Non-stationary pattern recognition -- 5. Robust endpoint detection -- 6. Detection-based decoder -- 7. Auditory-based time frequency transform -- 8. Auditory-based feature extraction and robust speaker identification -- 9. Fixed-phrase speaker verification -- 10. Robust speaker verification with stochastic matching -- 11. Randomly prompted speaker verification -- 12. Objectives for discriminative training -- 13. Fast discriminative training -- 14. Verbal information verification -- 15. Speaker authentication system design. Automatic speech recognition. Signals and communication technology. 7 cbc copycat 2 ncip 20 y-gencatlg acquire 2 shelf copies policy default xh14 2013-03-22 z-processor xh14 2013-03-26 to Dewey pc17 2011-09-21 xh00 2011-12-16 to USPL/STM LCAP batch update 2025-06-02-04:00: LCAPM-644 9783642237300 (Details)
  4. Novell Modular authentication service [electronic resource] : advanced authentication and authorization. Novell Modular authentication service [electronic resource] : advanced authentication and authorization. Modular authentication service Advanced authentication and authorization Enterprise ed., Version 2.0. Orem, UT : Novell, c2000. 1 CD-ROM ; 4 3/4 in. + 1 Novell client CD-ROM (4 1/3 in.) + 1 installation card (folded). Title from disc label. Installation and administration guides are located on the CD-ROM in the \doc\en directory. Client CD-ROM has date of August 2000. Designed to help the user protect information on the network. Includes login factors, methods and sequences, and password, biometric, and physical device authentication. System requirements for NetWare: NetWare Server NICI 1.5.7 or later; NetWare 5.1 with Support Pack 2 or later installed; NDS eDirectory 8.5 or later; ConsoleOne 1.2c or later. System requirements for Windows NT or 2000: Windows NT Server 4.0 with Service Pack 6a or later, or Windows 2000 Server; NDS eDirectory 8.5 or later. System requirements for Windows Client Workstation: Client or Server NICI 1.5.7 or later (if ran from Windows 95/98/NE/NT/2000); ConsoleOne 1.2d1; Windows 95 SR2B, Windows 98 SE, Windows ME, Windows 2000 Professional or Windows NT 4 with Service Pack 6a or later. Computer security Software. Computer networks Security measures Software. Software. lcgft https://id.loc.gov/authorities/genreForms/gf2022026086 Novell, Inc. 7 cbc origcop 2 ncip 20 y-gencompf Acquire 1 shelf copy policy default vb31 2002-06-12 vb31 2002-06-12 (rev vb27 2002-06-13) vb27 2002-06-13 to BCCD LCAP batch update 2025-06-01-04:00: LCAPM-893 (Details)
  5. Palmprint authentication / by David D. Zhang. Palmprint authentication / by David D. Zhang. Norwell, Mass. : Kluwer Academic Publishers, c2004. x, 241 p. : ill. ; 24 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier Kluwer international series on biometrics ; v. [3] Includes bibliographical references (p. [227]-235) and index. Biometric identification. Palmprints Identification. Publisher description http://www.loc.gov/catdir/enhancements/fy0820/2004302499-d.html Table of contents only http://www.loc.gov/catdir/enhancements/fy0820/2004302499-t.html 7 cbc copycat 2 ncip 20 y-gencatlg acquire 1 shelf copy policy default acquire 2 shelf copies policy default ps07 2004-09-09 z-processor to ASCD jg00 2004-09-11; jg05 2004-09-23 jg07 2004-09-24 to Dewey aa07 2004-09-28 LCAP batch update 2025-06-01-04:00: LCAPM-644, LCAPM-150 1402080964 (Details)
  6. Food authentication / edited by P.R. Ashurst and M.J. Dennis. Food authentication / edited by P.R. Ashurst and M.J. Dennis. 1st ed. London ; New York : Blackie Academic & Professional, 1996. xiv, 399 p. : ill. ; 25 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier Includes bibliographical references and index. Food adulteration and inspection. Food Analysis. Ashurst, P. R. Dennis, M. J. Publisher description http://www.loc.gov/catdir/enhancements/fy0829/96083679-d.html Table of contents only http://www.loc.gov/catdir/enhancements/fy0829/96083679-t.html 7 cbc orignew 2 opcn 19 y-gencatlg acquire 2 shelf copies policy default ADDED COPIES: another copy jf00 2003-01-08 pn12 06-04-96 pv06 2003-01-02 to ASCD; jf03 2003-01-28 to Subj.; jf04 2003-02-25 to S.L. jf12 2003-02-26 to Dewey aa03 2003-03-04 LCAP batch update 2025-06-02-04:00: LCAPM-644, LCAPM-150 0751403415 (Details)
  7. Chipless RFID authentication / Zeshan Ali, Etienne Perret, Nicolas Barbot, Romain Siragusa. Chipless RFID authentication / Zeshan Ali, Etienne Perret, Nicolas Barbot, Romain Siragusa. 2007 Hoboken : ISTE Ltd / John Wiley and Sons, 2020. pages cm text txt rdacontent unmediated n rdamedia volume nc rdacarrier Perret, Etienne, author. Barbot, Nicolas, author. Siragusa, Romain, author. 0 ibc orignew 2 epcn 20 y-gencatlg acquire 1 shelf copy policy default xd12 2020-05-08 (Details)
  8. A practical guide to document authentication. A practical guide to document authentication. Document authentication 1997-2006 : Dobbs Ferry, N.Y. : Oceana Publications, c1997- 2007-2011 : New York, NY : Oxford University Press 2011/2012 ed.- : [Eagan, MN] : West v. ; 26 cm. Annual text txt rdacontent unmediated n rdamedia volume nc rdacarrier 1997- "Legalization of notarized & certified documents." Volumes for 1997-2011 compiled by J.P. Sinnott; for 2011/2012- by J.S. Child, Jr. Vol. for 1997 called also 6th ed.; vol. for 2000 called also millennium ed. Continues a publication with the same title published in loose-leaf format. Latest issue consulted: 2011/2012 ed. Consular documents Certification Periodicals. Authentication Periodicals. Legalization Periodicals. Authentication. fast (OCoLC)fst00821630 Consular documents Certification. fast (OCoLC)fst00876188 Legalization. fast (OCoLC)fst00995576 Periodicals. fast (OCoLC)fst01411641 Periodicals. lcgft Sinnott, John P. Child, John S., Jr. https://id.oclc.org/worldcat/entity/E39PCjKh8tCGGBC3HHrx6w9Mj3 Sinnott, John P. Practical guide to document authentication (DLC) 83022023 (OCoLC)10045869 DLC 7 cbc serials 2 ncip 20 n-oclcserc Acquire Copy 1=LLRR later to stacks, Copy 2 =CIO to LL GLOBAL changed from 2 shelf copies AEH 2024-2-23 MWS, 2003-12-10 dm20 2003-12-09 to Selection Officer ejm, 2003-12-09 to LL RO ejm, 2003-12-11 to SERCAT dd00 2003-12-18 SERCAT3 da53 2004-05-04 da53 2004-05-17 da61 2005-03-29 ll28 2017-05-18 LCAP batch update 2025-06-01-04:00: LCAPM-644 (Details)
  9. Advances in User Authentication / by Dipankar Dasgupta, Arunava Roy, Abhijit Nag. Advances in User Authentication / by Dipankar Dasgupta, Arunava Roy, Abhijit Nag. 1st ed. 2017. Cham : Springer International Publishing : Imprint: Springer, 2017. 1 online resource (XIV, 360 pages 165 illustrations, 128 illustrations in color.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Infosys Science Foundation Series in Applied Sciences and Engineering, 2363-4995 Authentication Basics -- Biometric Authentication -- Negative Authentication Systems -- Pseudo-Passwords and Non-Textual Approaches -- Multi-Factor Authentication -- Continuous Authentication -- Adaptive Multi-Factor Authentication. This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, et cetera The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, et cetera Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists. Description based on publisher-supplied MARC data. Biometrics (Biology). Coding theory. Computer security. Data structures (Computer science). Information theory. Coding and Information Theory. https://scigraph.springernature.com/ontologies/product-market-codes/I15041 Biometrics. https://scigraph.springernature.com/ontologies/product-market-codes/I22040 Data Storage Representation. https://scigraph.springernature.com/ontologies/product-market-codes/I15025 Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28060 Nag, Abhijit, author. Roy, Arunava, author. Print version: Advances in user authentication. 9783319588063 (DLC) 2017944211 Printed edition: 9783319588063 Printed edition: 9783319588070 Printed edition: 9783319864785 Infosys Science Foundation Series in Applied Sciences and Engineering, 2363-4995 0 ibc origres u ncip 20 y-gencatlg acquire pcnspringer policy default Computer Science (R0) (SpringerNature-43710) Computer Science (SpringerNature-11645) springerpcn batch8 9783319588087 (Details)
  10. Hacking multifactor authentication /
    Roger A Grimes. Hacking multifactor authentication /
    Roger A Grimes. 2009 Indianapolis : John Wiley and Sons, 2020. pages cm text txt rdacontent unmediated n rdamedia volume nc rdacarrier 0 ibc orignew 2 epcn 20 y-gencatlg acquire 1 shelf copy policy default xd14 2020-07-20 9781119650799 (Details)
  11. BorderManager authentication service [computer file]. BorderManager authentication service [computer file]. Border manager authentication service Also known as: BorderManager authentication services Also known as: Novell BorderManager authentication service Provo, UT : Novell, c1998. 2 computer optical discs ; 4 3/4 in. + 1 installation and setup booklet + 2 instruction cards (folded) + 1 computer disk (3 1/2 in.) Title from disc label. Production level cataloging. Security and authentication program that controls remote access to network resources. System requirements for administration workstation: Windows 95 or NT 4.0. Computer security Software. Computer networks Security measures Software. Software. lcgft https://id.loc.gov/authorities/genreForms/gf2022026086 7 cbc origcop 4 ncip 20 y-gencompf acquire 1 shelf copy policy default vb22 to jf00 03-23-01 LCAP batch update 2025-06-01-04:00: LCAPM-893 (Details)
  12. Oils and fats authentication / edited by Michael Jee. Oils and fats authentication / edited by Michael Jee. Oxford : Blackwell Pub. ; Boca Raton, FL : CRC Press, 2002. xii, 211 p. : ill. ; 24 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier Chemistry and technology of oils and fats Includes bibliographical references and index. Oils and fats, Edible Quality control. Food adulteration and inspection. Jee, Michael. Publisher description http://www.loc.gov/catdir/enhancements/fy0646/2004267028-d.html 7 cbc copycat 2 ncip 20 y-gencatlg acquire 2 shelf copies policy default uf17 2003-08-20 Preprocessor uf20 2003-10-28 one copy to ASCD jp00 2004-01-29 jp43 2004-02-19 to subj jp02 2004-03-02 to Tech; jg05 2004-03-17 jg08 2004-03-19 to Dewey LCAP batch update 2025-06-01-04:00: LCAPM-644, LCAPM-150 1841273309 (Details)
  13. Fundamentals of passwordless authentication / Kaustubh Dhondge. Fundamentals of passwordless authentication / Kaustubh Dhondge. Norwood, MA : Artech House, [2025] xv, 338 pages : illustrations ; 24 cm. text txt rdacontent http://id.loc.gov/vocabulary/contentTypes/txt unmediated n rdamedia http://id.loc.gov/vocabulary/mediaTypes/n volume nc rdacarrier http://id.loc.gov/vocabulary/carriers/nc Computer security series Includes bibliographical references and index. Computers Access control. Computer security. Computer networks Security measures. Ordinateurs Accįes Contrćole. Sāecuritāe informatique. Rāeseaux d'ordinateurs Sāecuritāe Mesures. Artech House computer security series. 0 ibc copycat 2 ncip 20 y-gencatlg acquire 1 shelf copy policy default rn08 2026-04-03 Toolkit-Copy-Catalog to USASH 9781685690595 (Details)
  14. Proteomics for food authentication / edited by Leo M.L. Nollet and Semih čOtlešs. Proteomics for food authentication / edited by Leo M.L. Nollet and Semih čOtlešs. Boca Raton : CRC Press, Taylor & Francis Group, [2020] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Food analysis & properties Includes bibliographical references and index. Proteomics for food authentication / Ignacio Ortea, Gavin O'Connor, Alain Maquet -- 1-DE and 2-DE - in-gel tryptic digestion / Semih čOtlešs, Vasfiye Hazal čOzyurt -- Non-directed analysis / Dev Kant Shandilya -- Targeted proteomics for food authentication / Devarajan Thangadurai, Mojtaba Kordrostami, Saher Islam, Arun Kashivishwanath Shettar, Jeyabalan Sangeetha, Mohammad Mafakheri, Jasmin Habeeb, Abdel Rahman Mohammad Said Al-Tawaha, Steffi Simmi Maxim and Ravichandra Hospet -- A MALDI-TOF MS approach for mammalian, human, and formula milks' profiling / Laura Di Francesco, Francesco Di Girolamo, Maurizio Mennini , Andrea Masott, Guglielmo Salvatori, Giuliano Rigon, Fabrizio Signore, Emanuela Pietranton, Margherita Scapaticci, Isabella Lante, Bianca Maria Goffredo, Oscar Mazzina, Ahmed Ibrahim Elbousify, Paola Roncada, Andrea Dotta, Alessandro Fiocchi, and Lorenza Putignani -- MALDI-TOF-MS analysis of foods / Leo M.L. Nollet -- Whole protein analysis using LC-MS/MS for food authentication / Jeyabalan Sangeetha, Arun Kashivishwanath Shettar, Devarajan Thangadurai, Chethan Jambanna Dandin, Ravichandra Hospet, Bhavisha Prakashbhai Sheth, Saher Islam, Abdel Rahman Mohammad Said Al-Tawaha, Mojtaba Kordrostami and Mohammad Mafakheri -- Proteomic authentication of dairy products / Saher Islam, Devarajan Thangadurai -- Proteomic tools for improved processing of dry-cured meats / Leticia Mora, Fidel Toldrāa -- Fish / Marco Alexandre Cavaco Cerqueira, Ana Paula Farinha, Denise Schrama, Māarcio Jāulio Vicente Moreira, Clāaudia Sofia Ferreira Raposo de Magalhäaes, Pedro Miguel Leal Rodrigues -- Proteomics in authentication of wine / Javed Ahamad, Javed Ahmad, Showkat R. Mir, Raad A. Kaskoos -- Proteomics in authentication of honey / Javed Ahamad, Javed Ahmad, Muath Sh. Mohammed Ameen, Esra T. Anwer, Showkat R. Mir, Ameeduzzafar -- GMOs / Rajesh Kumar. "Consumers have the right to know what is in the food they are eating, and accordingly, a number of global food regulations require that the provenance of the food can be guaranteed from farm to fork. Many different instrumental techniques have been proposed for food authentication. Although traditional methods are still being used, new approaches such as genomics, proteomics, and metabolomics are helping to complement existing methodologies for verifying the claims made about certain food products. During the last decade, proteomics (the largescale analysis of proteins in a particular biological system at a particular time) has been applied to different research areas within food technology. Since proteins can be used as markers for many properties of a food, even indicating processes to which the food has been subjected, they can provide further evidence of the foods labeling claim. Proteomics for Food Authentication, a volume in the Food Analysis and Properties Series, is a comprehensive and updated overview of the applications, drawbacks, advantages, and challenges of proteomics for food authentication"-- Provided by publisher. Description based on print version record and CIP data provided by publisher. Food adulteration and inspection. Food Analysis. Food Quality. Proteomics. Nollet, Leo M. L., 1948- editor. čOtlešs, Semih, editor. Print version: Proteomics for food authentication Boca Raton : CRC Press, Taylor & Francis Group, [2020] 9780367205058 (DLC) 2020009181 7 cbc orignew 1 ecip 20 y-gencatlg acquire ecip ebook policy default ecip ebook 2020-05-08 rf06 2021-04-02 (telework) book rec'd LC online resource 2020-05-08 9780429261923 (Details)
  15. Food authentication and traceability / edited by Charis M. Galanakis. Food authentication and traceability / edited by Charis M. Galanakis. London ; San Diego, CA : Academic Press, an imprint of Elsevier, [2021] Ć2021 xviii, 396 pages : illustrations ; 24 cm text txt rdacontent still image sti rdacontent unmediated n rdamedia volume nc rdacarrier Includes bibliographical references and index. Food adulteration and inspection. Food contamination Analysis. Food fraud. Food Quality Technological innovations. Food Safety measures. Food Contamination Aliments Contamination Analyse. Aliments Falsification. Aliments Qualitāe Innovations. Aliments Sāecuritāe Mesures. Food fraud. fast (OCoLC)fst01983438 Food contamination Analysis. fast (OCoLC)fst00930747 Food adulteration and inspection. fast (OCoLC)fst00930671 Food Safety measures. fast (OCoLC)fst00930602 Galanakis, Charis M., editor. ebook version : 9780128231975 7 cbc copycat 2 ncip 20 y-gencatlg acquire 1 shelf copy policy default rn08 2022-08-04 z-processor rk06 2022-08-30 to CMD 9780128211045 (Details)
  16. Passwords : philology, security, authentication / Brian Lennon. Passwords : philology, security, authentication / Brian Lennon. Cambridge, Massachusetts ; London, England : The Belknap Press of Harvard University Press, [2018] xviii, 207 pages ; 24 cm text rdacontent unmediated rdamedia volume rdacarrier Includes bibliographical references and index. Passwords: philology, security, authentication -- Cryptophilology, I -- Machine translation: a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- Provided by publisher Computers Access control Passwords. Cryptography. Data encryption (Computer science) Philology. Electronic surveillance. 7 cbc orignew 1 ecip 20 y-gencatlg acquire 1 shelf copy policy default MH rk21 2017-08-11 to Dewey xm09 2017-08-11 xn11 2018-03-06 1 copy rec'd., to CIP ver. rk20 2018-03-19 book received in ART rf10 2018-03-27 (telework) CIP ver. to CALM MHCIP 2017-08-08 9780674980761 (Details)
  17. Proteomics for food authentication / edited by Leo M.L. Nollet, Semih čOtlešs. Proteomics for food authentication / edited by Leo M.L. Nollet, Semih čOtlešs. 2005 Boca Raton : CRC Press, [2020] pages cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier Food analysis & properties Includes bibliographical references and index. Proteomics for food authentication / Ignacio Ortea, Gavin O'Connor, Alain Maquet -- 1-DE and 2-DE - in-gel tryptic digestion / Semih čOtlešs, Vasfiye Hazal čOzyurt -- Non-directed analysis / Dev Kant Shandilya -- Targeted proteomics for food authentication / Devarajan Thangadurai, Mojtaba Kordrostami, Saher Islam, Arun Kashivishwanath Shettar, Jeyabalan Sangeetha, Mohammad Mafakheri, Jasmin Habeeb, Abdel Rahman Mohammad Said Al-Tawaha, Steffi Simmi Maxim and Ravichandra Hospet -- A MALDI-TOF MS approach for mammalian, human, and formula milks' profiling / Laura Di Francesco, Francesco Di Girolamo, Maurizio Mennini , Andrea Masott, Guglielmo Salvatori, Giuliano Rigon, Fabrizio Signore, Emanuela Pietranton, Margherita Scapaticci, Isabella Lante, Bianca Maria Goffredo, Oscar Mazzina, Ahmed Ibrahim Elbousify, Paola Roncada, Andrea Dotta, Alessandro Fiocchi, and Lorenza Putignani -- MALDI-TOF-MS analysis of foods / Leo M.L. Nollet -- Whole protein analysis using LC-MS/MS for food authentication / Jeyabalan Sangeetha, Arun Kashivishwanath Shettar, Devarajan Thangadurai, Chethan Jambanna Dandin, Ravichandra Hospet, Bhavisha Prakashbhai Sheth, Saher Islam, Abdel Rahman Mohammad Said Al-Tawaha, Mojtaba Kordrostami and Mohammad Mafakheri -- Proteomic authentication of dairy products / Saher Islam, Devarajan Thangadurai -- Proteomic tools for improved processing of dry-cured meats / Leticia Mora, Fidel Toldrāa -- Fish / Marco Alexandre Cavaco Cerqueira, Ana Paula Farinha, Denise Schrama, Māarcio Jāulio Vicente Moreira, Clāaudia Sofia Ferreira Raposo de Magalhäaes, Pedro Miguel Leal Rodrigues -- Proteomics in authentication of wine / Javed Ahamad, Javed Ahmad, Showkat R. Mir, Raad A. Kaskoos -- Proteomics in authentication of honey / Javed Ahamad, Javed Ahmad, Muath Sh. Mohammed Ameen, Esra T. Anwer, Showkat R. Mir, Ameeduzzafar -- GMOs / Rajesh Kumar. "Consumers have the right to know what is in the food they are eating, and accordingly, a number of global food regulations require that the provenance of the food can be guaranteed from farm to fork. Many different instrumental techniques have been proposed for food authentication. Although traditional methods are still being used, new approaches such as genomics, proteomics, and metabolomics are helping to complement existing methodologies for verifying the claims made about certain food products. During the last decade, proteomics (the largescale analysis of proteins in a particular biological system at a particular time) has been applied to different research areas within food technology. Since proteins can be used as markers for many properties of a food, even indicating processes to which the food has been subjected, they can provide further evidence of the foods labeling claim. Proteomics for Food Authentication, a volume in the Food Analysis and Properties Series, is a comprehensive and updated overview of the applications, drawbacks, advantages, and challenges of proteomics for food authentication"-- Provided by publisher. Food adulteration and inspection. Food Analysis. Food Quality. Proteomics. Nollet, Leo M. L., 1948- editor. čOtlešs, Semih, editor. Online version: Proteomics for food authentication Boca Raton : CRC Press, Taylor & Francis Group, [2020] 9780429261923 (DLC) 2020009182 7 cbc orignew 1 ecip 20 y-gencatlg acquire 1 shelf copy policy default LBSOR 2020-05-26 rl06 2020-05-06 to Dewey (TW Situational) xm08 2020-05-08 (telework) LBSORCIP 2020-05-26 9780367205058 (Details)
  18. Russian Federation : authentication of legal documents. Russian Federation : authentication of legal documents. [Washington, D.C.] : The Law Library of Congress, Global Legal Research Directorate, 2001 1 online resource (2 unnumbered pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier "January 2001." "LL File No. 2000-10127." Includes bibliographical references. Description based on online resource; title from PDF cover (Law Library of Congress, viewed May 3, 2022). "Prepared by Peter Roudik." Legal documents Russia (Federation) Authentication Russia (Federation) Authentication. fast (OCoLC)fst00821630 Legal documents. fast (OCoLC)fst00995459 Russia (Federation) fast (OCoLC)fst01262050 Law Library of Congress (U.S.). Global Legal Research Directorate, issuing body. https://purl.fdlp.gov/GPO/gpo176699 0 llglrd 2019670112 https://hdl.loc.gov/loc.law/llglrd.2019670112 0 ibc orignew 1 ncip 20 y-gencatlg llpub ll/glrd/dpub batch8 Electronic Resource (Details)
  19. Authentication of foreign documents: a guide to authentication of documents for use in the United States and abroad. Authentication of foreign documents: a guide to authentication of documents for use in the United States and abroad. Guide to authentication of documents for use in the United States and abroad [Washington, D.C.] : The Law Library of Congress, Global Legal Research Directorate, 2004. 1 online resource (11 pages) : color illustration text txt rdacontent computer c rdamedia online resource cr rdacarrier In scope of the U.S. Government Publishing Office Cataloging and Indexing Program (C&I) and Federal Depository Library Program (FDLP). "LL file no. 2004-00932." "LRA-D-PUB-002287." "June 2004." Includes bibliographical references. Description based on online resource; title from PDF cover (Law Library of Congress, viewed Oct. 12, 2023). Authentication United States. Evidence, Documentary United States. Authentication fast (OCoLC)fst00821630 Evidence, Documentary fast (OCoLC)fst00917224 United States fast (OCoLC)fst01204155 Law Library of Congress (U.S.). Global Legal Research Directorate, issuing body. llglrd 2021700441 https://hdl.loc.gov/loc.law/llglrd.2021700441 https://purl.fdlp.gov/GPO/gpo216415 0 0 ibc orignew 1 ncip 20 y-gencatlg llpub ll/glrd/dpub batch16 Electronic Resource (Details)
  20. BorderManager authentication services 3 [computer file]. BorderManager authentication services 3 [computer file]. Border manager authentication services 3 Also known as: Novell BorderManager authentication services 3 Provo, Utah : Novell, c1998. 5 computer optical discs ; 4 3/4 in. + 4 manuals + 1 readme first sheet (folded) + 1 computer disk (3 1/2 in.) Title from disc label. Production level cataloging. Security and authentication program that controls remote access to network resources. System requirements for administration workstation: Windows 95 or NT. In English, French, Dutch, Italian, Portuguese, and Spanish. Computer security Software. Computer networks Security measures Software. Software. lcgft https://id.loc.gov/authorities/genreForms/gf2022026086 7 cbc origcop 4 ncip 20 y-gencompf acquire 1 shelf copy policy default vb22 to bccd 04-05-01 LCAP batch update 2025-06-01-04:00: LCAPM-893 (Details)
  21. VLSI circuits for cryptographic authentication / Luca Henzen. VLSI circuits for cryptographic authentication / Luca Henzen. First edition. Konstanz : Hartung-Gorre Verlag, 2011. xiii, 181 pages : illustrations (some col.) ; 22 cm. text rdacontent unmediated rdamedia volume rdacarrier Series in microelectronics, 0936-5362 ; volume 214 Originally presented as the author's thesis (doctoral)--Eidgenčossische Technische Hochschule Zčurich, 2010. Includes bibliographical references (pages 165-180). Summaries in English and Italian. Digital communications Security measures. Cryptography. Hashing (Computer science) Integrated circuits Very large scale integration Design and construction. 7 cbc origres 3 ncip 20 y-gencatlg acquire 1 shelf copy policy default fd08 2011-04-01 z-processor fd00 2011-04-12 to GS/GER fd07 2013-01-11 to BCCD 20110210 231401 93001286 9783866283671 (Details)
  22. Kerberos : a network authentication system / Brian Tung. Kerberos : a network authentication system / Brian Tung. Reading, Mass. : Addison-Wesley, c1999. xv, 164 p. : ill. ; 21 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier The Addison-Wesley networking basics series Includes bibliographical references (p. 155-159) and index. Computer networks Security measures. Computer networks Access control. 7 cbc orignew 1 ocip 19 y-gencatlg pc06 to ja00 03-05-99; jg11 03-08-99 to Tech 1; jf08 03-09-99 to SL;jf12 03-11-99 to ddc; CIP ver. pv08 06-07-99 LCAP batch update 2025-06-02-04:00: LCAPM-644, LCAPM-150 c-GenColl TK5105.59 .T86 1999 Copy 1 BOOKS 0201379244 (Details)
  23. Access control, authentication, and public key infrastructure. Access control, authentication, and public key infrastructure. Second edition / Mike Chapple, Bill Ballad, Tricia Ballad, and Erin K. Banks. Sudbury, MA : Jones & Bartlett Learning, [2014] viii, 391 pages : illustrations ; 24 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier Jones & Bartlett Learning information systems security & assurance series Revision of: Access control, authentication, and public key infrastructure / Bill Ballad, Tricia Ballad, and Erin K. Banks. 2011. Includes bibliographical references (pages 375-378) and index. Computers Access control. Public key cryptography. Ballad, Bill. Ballad, Tricia. Banks, Erin K. 7 cbc origcop 2 ncip 20 y-gencatlg acquire 1 shelf copy policy default rl11 2014-05-13 z-processor rl11 2014-05-15 to Dewey rl11 2014-05-15 copy 2 discard xl03 2014-06-25 9781284031591 (Details)
  24. Authentication codes and combinatorial designs / Dingyi Pei. Authentication codes and combinatorial designs / Dingyi Pei. Boca Raton, FL : Chapman & Hall/CRC, 2006. viii, 244 p. ; 25 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier Discrete mathematics and its applications Includes bibliographical references (p. 233-236) and index. Data encryption (Computer science) Cryptography. Combinatorial designs and configurations. Table of contents only http://www.loc.gov/catdir/toc/ecip0518/2005026036.html Publisher description http://www.loc.gov/catdir/enhancements/fy0647/2005026036-d.html 7 cbc orignew 1 ecip 20 y-gencatlg acquire 2 shelf copies policy default jf05 2005-09-08 jf05 2005-09-08 to subj.; jf04 2005-09-09 to S.L. jf04 2005-09-09 to Dewey aa24 2005-09-09 ps05 2006-02-13 1 copy rec'd., to CIP ver. jp00 2006-02-18 jp00 2006-02-27 jp43 2006-03-01 Z-CipVer jp43 2006-03-01 to BCCD dj12 2006-10-5 copy 2 added LCAP batch update 2025-06-01-04:00: LCAPM-644, LCAPM-150 1584884738 (Details)
  25. Authentication systems for secure networks / Rolf Oppliger. Authentication systems for secure networks / Rolf Oppliger. Boston : Artech House, c1996. xvii, 186 p. : ill. ; 24 cm. text txt rdacontent unmediated n rdamedia volume nc rdacarrier The Artech House computer science library Includes bibliographical references (p. 177-180) and index. Computer networks Security measures. Computers Access control. Authentication. Cryptography. 7 cbc orignew 1 ocip 19 y-gencatlg acquire 1 shelf copy policy default pb11 to ja00 12-26-95; jf08 12-26-95 to Desc (subj done);; jf06 to sl 01-02-96; jf14 01-04-96;aa05 01-11-96; CIP ver. pv07 05-02-96 LCAP batch update 2025-06-02-04:00: LCAPM-644, LCAPM-150 ** LC HAS REQ'D # OF SHELF COPIES ** c-GenColl TK5105.59 .O77 1996 00039750284 Copy 1 BOOKS 0890065101 (Details)

More...