Corruption

Results: 19646



#Item
771

Online Appendix for “Institutional Trust, Education, and Corruption: A Micro-Macro Interactive Approach.” Table of Contents Table A1: Literature Survey of the Effects of Education on Institutional Trust .............

Add to Reading List

Source URL: www.quintonmayne.net

Language: English - Date: 2016-02-21 01:55:16
    772Economy / Finance / Money / Stock market / SEC filings / Conflict of interest / Corruption / Insider trading / Insider / Form 4 / Stock / Securities Exchange Act

    Inside Insider Trading: Patterns & Discoveries from a Large Scale Exploratory Analysis Acar Tamersoy Bo Xie

    Add to Reading List

    Source URL: www.cc.gatech.edu

    Language: English - Date: 2013-07-11 13:59:17
    773

    security research Adobe Reader X BMP/RLE heap corruption Adobe Reader X is a powerful software solution developed by Adobe Systems to view, create, manipulate, print and manage files in Portable Document Format (PDF). S

    Add to Reading List

    Source URL: www.binamuse.com

    Language: English
      774

      Anti-Bribery and Corruption:

      Add to Reading List

      Source URL: assets.kpmg.com

      Language: English - Date: 2016-02-27 17:43:15
        775

        How to HeapSpray and Exploit memory corruption in IIS6 Author: Date: Overview

        Add to Reading List

        Source URL: www.exploit-db.com

        Language: English - Date: 2015-08-31 12:15:37
          776

          Microsoft Word - Greening Corruption Watch letter _1_

          Add to Reading List

          Source URL: www.cw-uk.org

          Language: English - Date: 2015-05-18 13:25:33
            777

            Do Cash Transfers Distract Voters From Poor Economic Performance And From Corruption? Evidence From Latin America September 9, 2014

            Add to Reading List

            Source URL: www.narapavao.com

            Language: English - Date: 2014-09-17 11:39:12
              778

              Four main drivers: 1) Malpractice, Distrust, Corruption and Fraud 2) Missing Web 2.0 approaches 3) Need disclosure / privacy options including Open Data 4) Simple API protocols missing / lacking

              Add to Reading List

              Source URL: www.eviscape.com

              Language: English - Date: 2011-10-16 10:41:03
                779

                Identifying Memory Corruption Bugs with Compiler Instrumentations 이병영 (조지아공과대학교) @POC2014

                Add to Reading List

                Source URL: www.powerofcommunity.net

                Language: English
                  780

                  Corruption from a Cross-Cultural Perspective John Hooker Carnegie Mellon University OctoberAbstract

                  Add to Reading List

                  Source URL: actoolkit.unprme.org

                  Language: English - Date: 2013-11-29 16:03:01
                    UPDATE