{"title":"Profit","authors":"M. Sawyer","doi":"10.4324/9780429270086-48","DOIUrl":"https://doi.org/10.4324/9780429270086-48","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127143011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Danger","authors":"M. Sawyer","doi":"10.4324/9780429493386-51","DOIUrl":"https://doi.org/10.4324/9780429493386-51","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127727331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense","authors":"M. Sawyer","doi":"10.4324/9780429270086-39","DOIUrl":"https://doi.org/10.4324/9780429270086-39","url":null,"abstract":"Ensuring the balance between security and performance is a critical aspect of modern programming languages. While security checks are essential in safeguarding systems from threats and vulnerabilities, performance considerations are crucial for achieving optimal program execution speed and efficiency. It is worth noting that many programming languages (i","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disorder","authors":"M. Sawyer","doi":"10.4324/9780429493386-71","DOIUrl":"https://doi.org/10.4324/9780429493386-71","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128425863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Initiative","authors":"M. Sawyer","doi":"10.4324/9780429270086-40","DOIUrl":"https://doi.org/10.4324/9780429270086-40","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121129503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Host","authors":"M. Sawyer","doi":"10.4324/9780429493386-18","DOIUrl":"https://doi.org/10.4324/9780429493386-18","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133521040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offense","authors":"M. Sawyer","doi":"10.4324/9780429270086-38","DOIUrl":"https://doi.org/10.4324/9780429270086-38","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Marshes","authors":"M. Sawyer","doi":"10.4324/9780429493386-33","DOIUrl":"https://doi.org/10.4324/9780429493386-33","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Nearby","authors":"M. Sawyer","doi":"10.4324/9780429270086-65","DOIUrl":"https://doi.org/10.4324/9780429270086-65","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133181376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enduring Attacks","authors":"M. Sawyer","doi":"10.4324/9780429270086-84","DOIUrl":"https://doi.org/10.4324/9780429270086-84","url":null,"abstract":"","PeriodicalId":132093,"journal":{"name":"Unorthodox Strategies for the Everyday Warrior","volume":"644 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}