LEADER 01505ojm 2200253z- 450 001 9910157729603321 005 20251118110637.0 010 $a1-5159-9210-1 035 $a(CKB)3710000001002204 035 $a(BIP)060406058 035 $a(ODN)ODN0003136079 035 $a(EXLCZ)993710000001002204 100 $a20231107c2017uuuu -u- - 101 0 $aeng 200 10$aOver the Fence 210 $cTantor Audio 330 8 $aTwo neighbors-strangers-with one thing in common: they share a fence. But is that the only thing they share?Nathan Fraser lives a solitary life, never letting anyone get too close. It's safer that way. Kourtney Whyte hides from the world and behind her work, too afraid to really live her life to the fullest. Rejection is what she knows best. But one night, the sound of her soft voice and the tantalizing aroma of her evening meal prove too enticing for Nathan to ignore.So begins their unconventional relationship-talking, learning, texting, and gradually opening up to one another, all over the fence. That is, until the day Nathan braves the high fence to protect Kourtney from her past, and changes everything forever.Can they move forward together, without the buffer of the fence? Or will their pasts prove to be too much of a barrier?Contains mature themes. 700 $aMoreland$b Melanie$01435297 702 $aSokolov$b Tatiana$4nrt 702 $aLane$b John$4nrt 906 $aAUDIO 912 $a9910157729603321 996 $aOver the Fence$93592625 997 $aUNINA LEADER 04486nam 22006975 450 001 996647968403316 005 20250307115237.0 010 $a9783031859601 010 $a303185960X 024 7 $a10.1007/978-3-031-85960-1 035 $a(MiAaPQ)EBC31947424 035 $a(Au-PeEL)EBL31947424 035 $a(CKB)37788188500041 035 $a(OCoLC)1507696502 035 $a(DE-He213)978-3-031-85960-1 035 $a(EXLCZ)9937788188500041 100 $a20250307d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPassive and Active Measurement $e26th International Conference, PAM 2025, Virtual Event, March 10?12, 2025, Proceedings /$fedited by Cecilia Testart, Roland van Rijswijk-Deij, Burkhard Stiller 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (619 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15567 311 08$a9783031859595 311 08$a3031859596 327 $a -- IPv6. -- The Razor's Edge: IPv6 Extension Headers Survivability. -- A Closer Look at IPv6 IP-ID Behavior in the Wild. -- Understanding IPv6 Aliases and Detection Methods. -- Measurement Platforms. -- Marionette Measurement: Measurement Support under the PacketLab Model. -- A Tree in a Tree: Measuring Biases of Partial DNS Tree Exploration. -- An Integrated Active Measurement Programming Environment. -- Web / HTTP. -- HTTP Conformance vs. Middleboxes: Identifying Where the Rules Actually Break Down. -- A First Look at Cookies Having Independent Partitioned State. -- Web Crawl Refusals: Insights From Common Crawl. -- Connectivity. -- To Adopt or not to Adopt L4S-compatible Congestion Control? Understanding Performance in a Partial L4S Deployment. -- A Deep Dive into LEO Satellite Topology Design Parameters. -- Analyzing the Effect of an Extreme Weather Event on Telecommunications and Information Technology: Insights from 30 Days of Flooding. -- Routing. -- Detecting Traffic Engineering from Public BGP Data. -- Global BGP Attacks that Evade Route Monitoring. -- Anycast. -- Characterizing Anycast Flipping: Prevalence and Impact. -- An Empirical Evaluation of Longitudinal Anycast Catchment Stability. -- Phishing and Fraud. -- Partnėrka in Crime: Characterizing Deceptive Affiliate Marketing Offers. -- Characterizing the Networks Sending Enterprise Phishing Emails. -- 5G. -- A Large-Scale Study of the Potential of Multi-Carrier Access in the 5G Era. -- 5G Performance: A Multidimensional Variability Analysis. 330 $aThis book constitutes the proceedings of the 26th International Conference on Passive and Active Measurement, PAM 2025, held as a virtual event, during March 10?12, 2025. The 13 full papers and 7 short papers presented in this book were carefully reviewed and selected from 67 submissions. These papers cover a diverse range of topics, from 5G to IPv6, and from Web to Fraud. These papers have been categorized under the following topical sections: IPv6; Measurement Platforms; Web / HTTP; Connectivity; Routing; Anycast; Phishing and Fraud; 5G. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15567 606 $aApplication software 606 $aInformation technology$xManagement 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer and Information Systems Applications 606 $aComputer Application in Administrative Data Processing 606 $aCryptology 606 $aData and Information Security 615 0$aApplication software. 615 0$aInformation technology$xManagement. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 14$aComputer and Information Systems Applications. 615 24$aComputer Application in Administrative Data Processing. 615 24$aCryptology. 615 24$aData and Information Security. 676 $a005.3 700 $aTestart$b Cecilia$01791037 701 $avan Rijswijk-Deij$b Roland$01791038 701 $aStiller$b Burkhard$0801744 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996647968403316 996 $aPassive and Active Measurement$94327888 997 $aUNISA