Exploitation

Results: 4953



#Item
971

Groupe de travail Éducation (fr) Pourquoi promouvoir l’utilisation des Logiciels Libres dans votre université Les Logiciels Libres vous laissent le choix. Quel que soit le logiciel ou le système d’exploitation qu

Add to Reading List

Source URL: fsfe.org

Language: French - Date: 2014-01-23 18:00:47
    972Graphics file formats / Computer file formats / Adobe software / Animation software / SWF / Adobe Flash Player / Bytecode / Internet media type / Flash Video / Software / Computing / Adobe Flash

    Recurity Labs GmbH http://www.recurity-labs.comPreventing Adobe Flash Exploitation

    Add to Reading List

    Source URL: www.recurity-labs.com

    Language: English - Date: 2010-07-05 06:52:14
    973Oilfield terminology / Petroleum geology / Fossil fuels / Hydrocarbon exploration / Hydraulic fracturing / Water well / Annulus / Extraction of petroleum / Blowout / Petroleum / Petroleum production / Oil wells

    Oil and gas wells and their integrity: Implications for shale and unconventional resource exploitation

    Add to Reading List

    Source URL: www.dur.ac.uk

    Language: English - Date: 2014-03-25 05:40:13
    974Sexual Offences Act / English criminal law / Sex crimes / Criminal Law Amendment Act

    Queensland Criminal Law (Child Exploitation and Dangerous Drugs) Amendment Act 2013

    Add to Reading List

    Source URL: www.legislation.qld.gov.au

    Language: English - Date: 2013-04-28 22:23:34
    975Recife / Commercial sexual exploitation of children / Geography of Brazil / Child sexual abuse / Child prostitution / Child labour

    HAPPY CHILD INTERNATIONAL - A NEW SEASON! Speak up for those who cannot speak for themselves, for the rights of all who are destitute. Proverbs 31:8 Good News - Diana and Isaac return to their

    Add to Reading List

    Source URL: www.happychild.org

    Language: English - Date: 2015-03-07 16:53:45
    976

    Paris, le 29 décembre 2014 – RECRUTEMENT ARTS DECORATIFS Serrurier - Technicien Polyvalent Affectation : Service Technique Positionnement dans l’organisation : Direction du Développement et de l’Exploitation Typ

    Add to Reading List

    Source URL: www.lesartsdecoratifs.fr

    Language: French - Date: 2015-01-07 13:28:51
      977

      CONDUITE DES PRESSES OFFSET D’EXPLOITATION SIMPLE Présentation Durée : Objectifs :

      Add to Reading List

      Source URL: www.ofeli.fr

      Language: French - Date: 2011-01-12 03:52:28
        978Cross-site scripting / HTTP / HTTP cookie / JavaScript / SQL injection / Form / Cross-site request forgery / Code injection / Cyberwarfare / Computing / Computer security

        The Anato my of Cross Site Scripting Anatomy, Discovery, Attack, Exploitation by Gavin Zuchlinski ( ) http://libox.net/ November 5, 2003

        Add to Reading List

        Source URL: www.net-security.org

        Language: English - Date: 2003-11-06 15:38:22
        979Computer hardware / Computer programming / Central processing unit / Prefetch buffer / Addressing mode / Pointer / Tree traversal / Linked list / Linked data structure / Computing / Computer memory / Data types

        Multi-Chain Prefetching: Effective Exploitation of Inter-Chain Memory Parallelism for Pointer-Chasing Codes Nicholas Kohout Intel Corp. Seungryul Choi

        Add to Reading List

        Source URL: research.ac.upc.edu

        Language: English
        980Geology / Petroleum / Seismic source / Sonar / Aftershock / Earthquake / Seismic wave / Mechanics / Seismology / Solid mechanics

        Earth Planets Space, 56, 859–871, 2004 Exploitation of high-sampling Hi-net data to study seismic energy scaling: The aftershocks of the 2000 Western Tottori, Japan, earthquake Satoshi Ide1 , Makoto Matsubara2 , and K

        Add to Reading List

        Source URL: www.terrapub.co.jp

        Language: English - Date: 2004-10-13 23:10:30
        UPDATE