Search Results - cross-platform Python script
-
1
Source: Technology audit and production reserves; Vol. 3 No. 2(83) (2025): Information and control systems; 33-43
Technology audit and production reserves; Том 3 № 2(83) (2025): Інформаційно-керуючі системи; 33-43Subject Terms: дампи оперативної пам'яті, cryptographic protection, file system containers, кросплатформенний Python-скрипт, криптографічний захист, memory dumps, 'read-only' mode, режим 'read-only', digital forensics, cross-platform Python script, цифрова криміналістика, контейнери файлової системи
File Description: application/pdf
-
2
Alternate Title: РОЗРОБКА АРХІТЕКТУРИ БЕЗПЕЧНОГО СХОВИЩА ДЛЯ ЦИФРОВИХ ДОКАЗІВ.
Authors: Larchenko, Maryna1,2 urlinka2006@gmail.com
Source: Technology Audit & Production Reserves. 2025, Vol. 3 Issue 2(83), p33-43. 11p.
Subject Terms: *DIGITAL forensics, *ELECTRONIC evidence, *VIRTUAL machine systems, *LAW enforcement agencies, *DIGITAL preservation
-
3
Authors:
Source: Interdisciplinary Sciences: Computational Life Sciences; Sep2020, Vol. 12 Issue 3, p377-381, 5p
Subject Terms: PYTHON programming language, GENOMES, ANNOTATIONS, FILES (Records), OPTICAL character recognition, SCRIPTS
-
4
Authors: et al.
Source: Tomography: A Journal for Imaging Research; Oct2023, Vol. 9 Issue 5, p1723-1733, 11p
-
5
Source: Technology audit and production reserves; Vol. 3 No. 2(83) (2025): Information and control systems; 33-43; Technology audit and production reserves; 33-43; Technology audit and production reserves; 33-43; 2706-5448; 2664-9969
Index Terms: digital forensics, memory dumps, cryptographic protection, cross-platform Python script, file system containers, “read-only” mode, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
-
6
Authors: et al.
Source: 2009 International Conference on Communications, Circuits and Systems. :502-506
-
7
Authors: et al.
Source: Structural & Multidisciplinary Optimization; Jul2023, Vol. 66 Issue 7, p1-17, 17p
-
8
Authors: et al.
Source: Buildings (2075-5309); May2025, Vol. 15 Issue 10, p1658, 24p
-
9
Authors: et al.
Source: Tomography
Tomography, Vol 9, Iss 5, Pp 1723-1733 (2023)Subject Terms: magnetic resonance imaging, software tool, synthetic imaging, Communication, Computer applications to medicine. Medical informatics, R858-859.7, Contrast Media, Radiology, Software, Retrospective Studies
File Description: application/pdf
-
10
Authors:
Source: Molecular diversity [Mol Divers] 2025 Aug; Vol. 29 (4), pp. 3733-3752. Date of Electronic Publication: 2024 May 14.
Publication Type: Journal Article; Review
Journal Info: Publisher: ESCOM Science Publishers Country of Publication: Netherlands NLM ID: 9516534 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1573-501X (Electronic) Linking ISSN: 13811991 NLM ISO Abbreviation: Mol Divers Subsets: MEDLINE
MeSH Terms: Software* , Programming Languages*, Cheminformatics/methods
-
11
Authors: Daniyan MO; Department of Pharmacology, Obafemi Awolowo University, Ile-Ife, Osun, Nigeria.
Source: Journal of biomolecular structure & dynamics [J Biomol Struct Dyn] 2024 Sep; Vol. 42 (14), pp. 7207-7220. Date of Electronic Publication: 2023 Jul 24.
Publication Type: Journal Article
Journal Info: Publisher: Taylor & Francis Country of Publication: England NLM ID: 8404176 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1538-0254 (Electronic) Linking ISSN: 07391102 NLM ISO Abbreviation: J Biomol Struct Dyn Subsets: MEDLINE
-
12
Authors:
Resource Type: eBook.
Subjects: Python (Computer program language), Computer graphics--Computer programs, Computer graphics--Mathematics
Categories: COMPUTERS / Software Development & Engineering / Computer Graphics, COMPUTERS / Programming / Games, COMPUTERS / Computer Science, COMPUTERS / Programming / General, COMPUTERS / Languages / Python, COMPUTERS / Programming / Open Source
PDF Full Text -
13
Authors: Hussam Khrais
Resource Type: eBook.
Subjects: Python (Computer program language), Penetration testing (Computer security), Application software--Testing
Categories: COMPUTERS / Security / General, COMPUTERS / Security / Network Security, COMPUTERS / Languages / Python
-
14
-
15
Authors:
Source: Medicinal Chemistry Research; Apr2015, Vol. 24 Issue 4, p1617-1625, 9p
-
16
Authors: et al.
Source: Journal of the American Medical Informatics Association; Oct2024, Vol. 31 Issue 10, p2202-2209, 8p
-
17
Authors: et al.
Source: Applied Sciences (2076-3417); Jul2023, Vol. 13 Issue 14, p8539, 16p
Subject Terms: INFORMATION retrieval, MACHINE learning, LOCATION data, PYTHON programming language, INTELLIGENT transportation systems, TEXT mining, GEOTAGGING
Geographic Terms: INDONESIA, JAKARTA (Indonesia)
-
18
Authors: et al.
Source: Molecular Ecology Resources; Jul2021, Vol. 21 Issue 5, p1697-1704, 8p
-
19
Authors:
Subject Terms: secure code sharing, source code protection, python code encryption, code obfuscation, python security, license management, cloud platform, code protection, secure file transfer, python development, intellectual property protection, software licensing, code security, python obfuscator, secure distribution
Relation: https://github.com/alphabetanetcom/secure-python-code-manager/tree/v1.5.1-beta.3; https://zenodo.org/records/14562853; oai:zenodo.org:14562853; https://doi.org/10.5281/zenodo.14562853
-
20
Authors: et al.
Source: Sensors (14248220); Mar2022, Vol. 22 Issue 5, pN.PAG-N.PAG, 1p
Nájsť tento článok vo Web of Science
Full Text Finder