Exploit

Results: 786



#Item
631Infrared imaging / Chemistry / Science / Imaging / Infrared spectroscopy / Hyperspectral imaging / Chemical imaging / Imaging spectroscopy / Spectroscopy / Remote sensing / Optics

Hyperspectral Analysis The Hyperspectral Analysis process in TNTmips provides the specialized tools you need to fully exploit the spectral range and spectral resolution of your hyperspectral images. On-the-fly reflectanc

Add to Reading List

Source URL: www.microimages.com

Language: English - Date: 2013-07-18 18:32:45
632Human trafficking / Ethics / Human trafficking in the United States / Human trafficking in Afghanistan / Crime / Coalition Against Trafficking in Women / Laws regarding prostitution

“Sex trafficking does not just exist because its victims are vulnerable – it exists because there is a demand for commercial sex that traffickers can exploit and profit from” (Equality Now, [removed]The forced labor

Add to Reading List

Source URL: girlsrights.org

Language: English - Date: 2014-04-27 11:06:08
633Association of Polar Early Career Scientists / Earth / International Polar Year / Academia / Arctic / Antarctic / Earth sciences / Professional associations / Planetary science

IPO IPY Planning Document[removed]and Beyond “The IPY aims to exploit the intellectual resources and science assets of nations worldwide to make major advances in polar knowledge and understanding, while leaving a legac

Add to Reading List

Source URL: classic.ipy.org

Language: English - Date: 2008-06-26 07:01:12
634Academic dishonesty / Cheating / Academic integrity / Test / Plagiarism / Infidelity / Exploit / Education / Knowledge / Academia

Butler Community College  [removed]  ACADEMIC INTEGRITY SURVEY  Summary Report  Friday, November 02, 2007 

Add to Reading List

Source URL: ir.butlercc.edu

Language: English - Date: 2008-01-14 10:13:11
635Peacekeeping / Technology / United Nations / Development / Open government

ECOSOC Session “How can UN entities best exploit synergy in the area of administrative services at the country level: challenges and opportunities

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2012-07-19 10:39:56
636Security / Hacking / Software testing / Carnegie Mellon University / Computer emergency response team / Vulnerability / Request Tracker / Attack / Exploit / Computer security / Cyberwarfare / Computer network security

Microsoft PowerPoint - BENELUX Cyber Sec Conf November 2011 CERT Workshop FINAL v5.pptx [Read-Only]

Add to Reading List

Source URL: www.mediacom.public.lu

Language: English - Date: 2014-04-14 03:02:34
637Computing / Software testing / Hacking / Electronic commerce / Cross-site scripting / Application security / Vulnerability / Exploit / Web application security / Computer security / Cyberwarfare / Computer network security

… White paper Web Application Security: GamaSec Solution 1. Web Applications: An attractive target How do you cost effectively defend web applications from attack? Your organization relies on

Add to Reading List

Source URL: www.alentus.com

Language: English - Date: 2011-04-06 12:15:34
638Hacking / Software testing / Vulnerability / Responsible disclosure / Software bugs / Full disclosure / Pwn2Own / Exploit / Google Chrome / Software / Computer security / Computing

HP-Vulnerability_Infographic_v1

Add to Reading List

Source URL: www.pwn2own.com

Language: English - Date: 2014-03-05 10:32:45
639Computing / Malware / Electronic voting / DNS spoofing / Denial-of-service attack / Computer worm / Computer virus / Exploit / Botnet / Computer network security / Cyberwarfare / Computer security

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [removed]

Add to Reading List

Source URL: www.electioncenter.org

Language: English - Date: 2007-03-13 00:00:00
640Computer security / Two-factor authentication / Phishing / Twitter / Authentication / Password / Exploit / Security / Technology / Computer network security

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 8, AUGUST[removed]On the Security of Trustee-Based Social Authentications

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-07-09 00:25:17
UPDATE