9-1-1

Results: 45241



#Item
1

1/9 Konjunktur Eine Research-Publikation der DZ BANK AG USA: Kräftiges Wachstum, da

Add to Reading List

Source URL: bielmeiersblog.dzbank.de

Language: German - Date: 2018-08-01 07:40:46
    2Data management / Software / Computing / System administration / Cross-platform software / Relational database management systems / PostgreSQL / SQL / Column / Superuser / Sudo / Database

    UNCLASSIFIED   PostgreSQL 9.x Security Technical Implementation Guide Version: 1

    Add to Reading List

    Source URL: www.crunchydata.com

    Language: English - Date: 2018-10-22 15:02:19
    3Cryptography / Cryptographic hash functions / HMAC / MD5 / Crypt / Collision attack / Padding / SHA-2 / MerkleDamgrd construction / SHA-1 / Hash function / Length extension attack

    EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:22
    4Terms of service / Internet privacy / Law / Computing / World Wide Web / Privacy policy / Privacy / HTTP cookie / Gmail / Medical privacy / Google Analytics / Personally identifiable information

    Microsoft Word - Consumer Privacy Notice Newsamerica.com (US_Can version)_9 1-25-17FINAL.docx

    Add to Reading List

    Source URL: newsamerica.com

    Language: English - Date: 2018-10-01 16:21:07
    5Computing / Concurrent computing / Apache Software Foundation / Parallel computing / Cloud infrastructure / Apache Hadoop / Hadoop / Benchmark / Vertica / PageRank / Speedup / MapReduce

    arXiv:1711.03229v1 [cs.AR] 9 NovA Dwarf-based Scalable Big Data Benchmarking Methodology Wanling Gao1,2 , Lei Wang1,2 , Jianfeng Zhan ∗1,2 , Chunjie Luo1,2 , Daoyi Zheng1,2 , Zhen Jia4 , Biwei Xie1,2 , Chen

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2017-11-09 20:34:31
    6Terrorism / Financial regulation / Economy / Government / Crime / Money laundering / United States Department of the Treasury / Financial Crimes Enforcement Network / Tax evasion in the United States / Bank Secrecy Act / Suspicious activity report / Financial intelligence

    Page 13 TITLE 31—MONEY AND FINANCE (Added Pub. L. 101–73, title III, § 307(a)(1), Aug. 9, 1989, 103 Stat. 352; amended Pub. L. 103–272,

    Add to Reading List

    Source URL: www.gpo.gov

    Language: English - Date: 2018-04-27 09:24:02
    7Survey methodology / Measurement / Sampling / Response rate / Scientific method

    Survey of Burma/Myanmar Public Opinion March 9 – April 1, 2017 Detailed Methodology •

    Add to Reading List

    Source URL: www.iri.org

    Language: English - Date: 2018-01-29 10:31:53
    8Computer programming / Software engineering / Computing / Object-oriented programming languages / Functional languages / Data types / Functional programming / Scripting languages / Racket / Generator / Macro / Mutator method

    The Racket Reference Version 6.9 Matthew Flatt and PLT May 1, 2017

    Add to Reading List

    Source URL: download.racket-lang.org

    Language: English - Date: 2017-05-01 21:15:27
    9Economy / Decentralization / Finance / Money / Draft:OPSkins / Online marketplaces / Cryptocurrencies / Malcolm CasSelle / Virtual economy / Market / Blockchain / Alibaba Group

    Worldwide Asset eXchange (WAX) Global Decentralized Marketplace for Video Game Virtual Assets White Paper Version 1.9

    Add to Reading List

    Source URL: wax.io

    Language: English - Date: 2018-10-11 18:02:56
    10Theoretical computer science / Formal language

    CSCE 222: Fall 2014 Quiz 9 TAKE HOME A TAKE HOME quiz. Name (No UIN numbers): This is an open-book take-home quiz. You must work on this quiz yourself, with no assistance from any person or other entity.1 You may use the

    Add to Reading List

    Source URL: faculty.cse.tamu.edu

    Language: English - Date: 2014-12-08 19:22:29
    UPDATE