Document Exploitation

Results: 59



#Item
11

Ce document est la propriété exclusive de Philippe LE BOULANGERoctobre 2013 à 12:23 LEPTON, UN SYSTÈME D EXPLOITATION TEMPS RÉEL POUR LES SYSTÈMES ENFOUIS par Jean-Jacques PITROLLE

Add to Reading List

Source URL: o10ee.com

Language: French - Date: 2014-03-15 06:09:02
    12Abuse / Human behavior / Child prostitution / Child abuse / Sex crimes / Commercial sexual exploitation of children / Prostitution of children / CSEC / ECPAT / Child sexual abuse / Human trafficking / Human sexuality

    Commercial Sexual Exploitation of Children (CSEC) and Child Sexual Abuse (CSA) in the Pacific: A Regional Report This document was prepared for UNICEF, UNESCAP and ECPAT International by the Pacific Regional Rights R

    Add to Reading List

    Source URL: www.humantrafficking.org

    Language: English - Date: 2007-03-31 14:25:02
    13Economics / United Nations Conference on Trade and Development / Trade and development / Exploitation / Development / International relations / United Nations

    Third United Nations Conference on the Law of the SeaConcluded at Montego Bay, Jamaica on 10 December 1982 Document:-

    Add to Reading List

    Source URL: legal.un.org

    Language: English - Date: 2013-09-27 13:21:07
    14International economics / Economics / New International Economic Order / United Nations Conference on Trade and Development / Trade and development / Exploitation / Export / International trade / Development / International relations

    Third United Nations Conference on the Law of the SeaConcluded at Montego Bay, Jamaica on 10 December 1982 Document:-

    Add to Reading List

    Source URL: legal.un.org

    Language: English - Date: 2013-09-27 13:21:08
    15Statistical natural language processing / Latent Dirichlet allocation / Relevance feedback / Topic model / Relevance / Query expansion / Document retrieval / Search engine indexing / Language model / Information science / Information retrieval / Science

    LLNL-TRRapid Exploitation and Analysis of Documents D. J. Buttler, D. Andrzejewski, K. D. Stevens, D.

    Add to Reading List

    Source URL: fas.org

    Language: English - Date: 2014-05-06 20:17:00
    16Language learning software / E-learning / Computer-assisted language learning / Framework Programmes for Research and Technological Development / Lifelong learning / Virtual learning environment / Educational technology / Education / Learning / Distance education

    Exploitation plan December 2012 This project has been funded with support from the Lifelong Learning Programme of the European Commission. This document reflects only the views of the authors, and the European Commission

    Add to Reading List

    Source URL: langblog.test.speakapps.org

    Language: English - Date: 2014-03-18 08:13:00
    17Crime / Child sexual abuse / Sexual abuse / Gender-based violence / Violence against women / Child abuse / Commercial sexual exploitation of children / Abuse / Human sexual activity / Human sexuality / Human behavior / Sex crimes

    Safeguarding Children and Young People from Sexual Exploitation Policy, Guidance and Risk Assessment 1. Introduction This document provides guidance for all agencies in Suffolk working to ensure a collaborative response

    Add to Reading List

    Source URL: suffolksafeguardingchildrenboard.onesuffolk.net

    Language: English - Date: 2014-07-29 09:51:03
    18Software / Computing / Impact assessment / Computer architecture / Evaluation / Ereport / Android / Embedded Linux / Smartphones

    Exploitation and Valorisation Plan This document has been produced with the financial assistance of the European Union. The contents are the sole responsibility of the Network consortium and can under no circumstances b

    Add to Reading List

    Source URL: www.disaster-resilience.net

    Language: English
    19Tax / Commercial sexual exploitation of children / Charitable organization / Fundraising / Business / Economics / Structure / Child sexual abuse / Give2Asia / Prostitution of children

    HOW TO SUPPORT THE ECPAT-CAMBODIA FUND AT GIVE2ASIA This document outlines how donors can support End Child Prostitution, Abuse and Trafficking in Cambodia (ECPAT-Cambodia) with U.S.-based assets by making tax-deductible

    Add to Reading List

    Source URL: www.ecpatcambodia.org

    Language: English - Date: 2014-06-20 02:16:52
    20Computer network security / FTP clients / Microsoft Windows / Hacking / Vulnerability / Internet Explorer 6 / Buffer overflow / Internet Explorer / Windows Vista / Computer security / Computing / Cyberwarfare

    Software Vulnerability Exploitation Trends Exploring the impact of software mitigations on patterns of vulnerability exploitation Software Vulnerability Exploitation Trends This document is for informational purposes on

    Add to Reading List

    Source URL: download.microsoft.com

    Language: English - Date: 2013-07-24 13:36:39
    UPDATE