ALI

Results: 6742



#Item
661

Učlani se Iako su prava radnika zaštićena zakonom, u praksi se ta prava ne poštuju uvijek. Kao pojedinac, možda ne možete mnogo utjecati na svojega poslodavca, ali radnici zajedno, organizirani u sindikat, imaju zn

Add to Reading List

Source URL: www.sgh.hr

Language: Croatian - Date: 2013-08-23 08:10:44
    662

    Ali al Saeed, Tareq al Nefisi and Sameer Arif The evening’s

    Add to Reading List

    Source URL: d27eu4pc7s2dky.cloudfront.net

    Language: English - Date: 2016-02-05 13:40:40
      663

      informativni priručnik za ireligiozne roditelje prvašića i školaraca Roditeljima prvašića, ali i starijih osnovnoškolaca, polazak u školu nameće i pitanja oko školskog

      Add to Reading List

      Source URL: www.civilcourage.hr

      Language: Croatian - Date: 2014-04-01 18:37:47
        664

        P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks Florian Adamsky City University London Syed Ali Khayam

        Add to Reading List

        Source URL: www.usenix.org

        Language: English - Date: 2016-02-21 19:32:48
          665

          Enabling Author-Centric Ranking of Web Content Muneeb Ali and Andrea S. LaPaugh Princeton University {muneeb,aslp}@cs.princeton.edu ABSTRACT

          Add to Reading List

          Source URL: muneebali.com

          Language: English - Date: 2015-03-10 18:39:22
            666Computing / Software bugs / Software engineering / Blind return oriented programming / Computer errors / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / Shellcode / Stack

            Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

            Add to Reading List

            Source URL: www.scs.stanford.edu

            Language: English - Date: 2016-01-02 20:09:14
            667

            Architecture-­‐level  Security  Issues     for  main  memory   Ali  Shafiee   Aganda   •  Replay-­‐A;ack  

            Add to Reading List

            Source URL: www.eng.utah.edu

            Language: English - Date: 2015-10-07 16:52:04
              668

              TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication Ralph Holz∗ , Johanna Amann‡ , Olivier Mehani† , Matthias Wachs§ , Mohamed Ali Kaafar† ∗ University of Sydney, Au

              Add to Reading List

              Source URL: olivier.mehani.name

              Language: English - Date: 2016-02-03 02:14:51
                669

                FOR IMMEDIATE RELEASE Ali Cherri, The Disquiet, 2013, courtesy of Imane Farès Gallery, Paris and the artist. The Time is Out of Joint 12 March - 12 June, 2016

                Add to Reading List

                Source URL: prod-images.exhibit-e.com

                Language: English - Date: 2016-03-21 11:30:17
                  670

                  RAČUNALNIŠTVO V OBLAKU Na kaj morate paziti, preden se odločite za uporabo? Zagotovo ste opazili, da se v zadnjem času vse več uporablja izraz računalništvo v oblaku. Ali pa ste

                  Add to Reading List

                  Source URL: www.ip-rs.si

                  Language: Slovenian - Date: 2015-11-25 09:27:39
                    UPDATE