Exploit

Results: 786



#Item
601Application programming interface / Technical communication / Parameter / Server / Function / JavaScript / Software engineering / Mathematics / Computing

Package ‘rtematres’ July 2, 2014 Title The rtematres API package Description Exploit controlled vocabularies organized on tematres servers. Version 0.2 Author Claas-Thido Pfaff Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 16:22:36
602Microbiology / Antibiotics / Bacterial diseases / Staphylococcaceae / Eli Lilly and Company / Antibiotic resistance / Methicillin-resistant Staphylococcus aureus / Antimicrobial / Antibacterial / Medicine / Biology / Health

PROJECT SYNOPSES Integrating genomics-based applications to exploit actinomycetes as a resource for new antibiotics

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2009-06-18 04:32:08
603Computer network security / Software testing / Hacking / Metasploit Project / Exploit / Armitage III / BackTrack / Nmap / Nessus / Software / Computer security / Cyberwarfare

toolsmith ISSA Journal | January 2011 Armitage By Russ McRee – ISSA member, Puget Sound (Seattle), USA Chapter

Add to Reading List

Source URL: holisticinfosec.org

Language: English - Date: 2011-01-03 12:51:39
604LHA / United States Navy / Naval Surface Warfare Center / Naval Sea Systems Command

Fleet Readiness R&D Program At a Glance What is it? The Fleet Readiness R&D Program is designed to exploit mature technologies

Add to Reading List

Source URL: greenfleet.dodlive.mil

Language: English - Date: 2010-04-19 14:53:00
605Ethics / Deception / Fraud / Insurance fraud / Common law / Data Analysis Techniques for Fraud Detection / Classical cipher / Crimes / Law / Tort law

Global Financial Crime Networks Exploit Government and Private Sector Vulnerabilities The Most Profitable Criminals In History Know Your Enemy…….Know Yourself: Adapt Your

Add to Reading List

Source URL: rockinst.org

Language: English - Date: 2013-11-12 15:26:48
606Ecosystems / Agriculture / Regions of South America / Environmental issues / Tropical and subtropical moist broadleaf forests / Tropical rainforest / Soil / Shifting cultivation / Forest / Environment / Earth / Land management

Source: The Economist, September 4, [removed]Reading 12-2 The Vanishing Jungle Large tracts of tropical rain forest are being turned into barren waste by ill-prepared attempts to exploit them. Even carefully planned scheme

Add to Reading List

Source URL: www.hort.purdue.edu

Language: English - Date: 2008-08-19 10:08:44
607Representative payee / Social work / Caregiver / Trust law / Static single assignment form / Law / Social Security / Taxation in the United States

Financial Exploitation Financial exploitation can happen to anyone, including people with developmental disabilities. Unfortunately, much of the time, those who financially exploit others can include trusted family membe

Add to Reading List

Source URL: www.ddssafety.net

Language: English - Date: 2014-11-11 10:13:20
608Computer security / Malware / Gumblar / Browser exploit / Computer virus / Drive-by download / Rogue software / MPack / Rogue security software / Computer network security / Computing / Cyberwarfare

Malware Infections Market

Add to Reading List

Source URL: www.team-cymru.com

Language: English - Date: 2014-10-13 13:28:05
609Child sexual abuse / Childhood / Pedophilia / U.S. Immigration and Customs Enforcement / Child pornography / Child erotica / Sexual slavery / Human sexuality / Sex crimes / Human behavior

FOR IMMEDIATE RELEASE May 19, 2014 Michael Dean Ross Sentenced to 24 Years in Prison for Child Sexual Exploitation PHOENIX – A man who used Facebook to lure and sexually exploit underage victims will spend 24 years in

Add to Reading List

Source URL: www.maricopacountyattorney.org

Language: English - Date: 2014-05-19 19:02:21
610Computer security / Denial-of-service attack / Intrusion detection system / Malware / Internet security / AAFID / Exploit / Private network / Firewall / Computer network security / Cyberwarfare / Computing

A Denial of Service Resistant Intrusion Detection Architecture Peter Mell, Donald Marks, Mark McLarnon National Institute of Standards and Technology Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE