1991, Kenneth Goodman, The KBMT Project[1], →ISBN:
Recall that if asterisks are pre- and postpended they designate semantic information in f-structures.
2003, Algorithms in Bioinformatics[2], →ISBN, page 398:
In each run a random sequence is generated, prepended and postpended with short primers to separate the initiation and termination tasks from the reconstruction task.
2011, Dave Kleiman, The Official CHFI Study Guide (Exam 312-49)[3], →ISBN:
A hybrid attack is used to find passwords that are a dictionary word with combinations of characters prepended or postpended to it.