As a result, employers have stepped up their surveillance of employees, often using stealth techniques to peer deep into their computer use.
These include polymorphism, stealth techniques, regeneration, and disabling anti-malware software.
This family uses advanced defensive and stealth techniques to escape detection and to hinder removal.
He is a very skilled hand-to-hand combatant and a master of stealth techniques.
On earth, "stealth" techniques are widely used in military fighters, bombers and cruise missiles to reduce their visibility to enemy radars.
His years of diving have made him very nimble and is skilled in stealth techniques.
Researchers at Liposome Technology Inc. and their partners in academia have had success with the stealth technique in laboratory experiments with mice.
Dolph constantly claims that he has received training as both a ninja and by the special forces, and that he is an expert in stealth techniques.
The physical training of the Academy, hours on end of dueling exercises and stealth techniques, was more to Drizzt's liking.
Pre-programmed frequency agility also forms the basis of some military radio encryption and stealth techniques.