Exploit

Results: 786



#Item
491Water / Water pollution / Environmental engineering / Aquatic ecology / Environmental soil science / Sewage treatment / Sanitation / Reclaimed water / Urine / Environment / Sewerage / Earth

Wastewater management Cleantech for wastewater treatment of the future In wastewater treatment, environmentally sound and resource-efficient technologies should also exploit the resources contained in wastewater itself.

Add to Reading List

Source URL: www.eawag.ch

Language: English - Date: 2011-06-21 08:10:43
492Mitsui / NEC / Transducers / Piezoelectricity / Capacitor / Personal computer / Lithium-ion battery / Technology / Energy / Semiconductor companies

General Explanation of Special Issue NEC TOKIN - Solution Strategy Based on Creation of Key Devices That Exploit Advanced Materials One of the corporate aims of NEC TOKIN is to become a “Device Creation Company Origina

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:35:35
493Software testing / Hacking / Penetration test / Metasploit Project / Social engineering / White hat / Pass the hash / Exploit / Attack / Computer security / Cyberwarfare / Computer network security

F U T U R E P E N TE S TING

Add to Reading List

Source URL: counterhack.net

Language: English - Date: 2015-02-12 08:51:55
494Computing / CVSS / Hacking / Software testing / Vulnerability / Exploit / Transmission Control Protocol / Denial-of-service attack / Computer network security / Cyberwarfare / Computer security

Siemens Security Advisory by Siemens ProductCERT SSA[removed]: Vulnerabilities in SINEMA Server

Add to Reading List

Source URL: www.siemens.com

Language: English - Date: 2014-04-16 05:47:35
495Smartphones / Information appliances / Android software / Voter database / Mobile operating system / Internet privacy / Android / Mobile technology / BlackBerry / Software / Computing / Technology

Smartphones and Election 2012 Lillie Coney,* C. Aaron Cois,* and Beth Rosenberg* The increased prevalence of smartphones has the potential to deceive and exploit voters during the 2012 election season. The danger posed t

Add to Reading List

Source URL: www.jdsupra.com

Language: English
496Smartphones / Information appliances / Android software / Voter database / Mobile operating system / Internet privacy / Android / Mobile technology / BlackBerry / Software / Computing / Technology

Smartphones and Election 2012 Lillie Coney,* C. Aaron Cois,* and Beth Rosenberg* The increased prevalence of smartphones has the potential to deceive and exploit voters during the 2012 election season. The danger posed t

Add to Reading List

Source URL: documents.jdsupra.com

Language: English - Date: 2013-07-08 11:08:47
497Nye / Virginia Beach /  Virginia / Pittsburgh International Airport / Geography of the United States / Transport / Pennsylvania / Moving company / Better Business Bureau

THE MOST OF YOUR This E-Sheet(R) is provided as confirmation that the ad appeared in The Virginian-Pilot on the date and page indicated. You may not create derivative works, or in any way exploit or repurpose any content

Add to Reading List

Source URL: www.absolutemovingcompany.com

Language: English - Date: 2014-11-18 12:25:51
498Software testing / Computer network security / Hacking / Vulnerability / Application security / Cloud computing / Web application security / Application firewall / IBM cloud computing / Computing / Computer security / Cyberwarfare

Cenzic Overview Businesses and governments rely on Cloud, Mobile and Web applications to run their organizations as well as to interact with customers and partners. But, these applications are at constant risk of exploit

Add to Reading List

Source URL: www.cenzic.com

Language: English - Date: 2014-03-07 17:16:34
499Debt / Debt-to-GDP ratio / External debt / Gross domestic product / Financial crisis / United States public debt / Political debates about the United States federal budget / Economics / Government debt / Macroeconomics

American Economic Review: Papers & Proceedings 2010, 100:2, 1–9 http://www.aeaweb.org/articles.php?doi=[removed]aer[removed]Growth in a Time of Debt By Carmen M. Reinhart and Kenneth S. Rogoff* In this paper, we exploit

Add to Reading List

Source URL: www.ycsg.yale.edu

Language: English - Date: 2010-09-24 11:09:51
500Hacking / Software testing / Vulnerability / Firefox / Malware / Patch Tuesday / Computer worm / Browser exploit / SecuriTeam / Software / Computer security / Computing

X-Force_2007_TrendsData_Draft2

Add to Reading List

Source URL: www-935.ibm.com

Language: English - Date: 2008-02-11 23:01:07
UPDATE