Forgery

Results: 1137



#Item
181Scripting languages / Cross-platform software / Web development / Graphics file formats / Cross-site scripting / JavaScript / Cross-site request forgery / Adobe Flash Player / SWF / Software / Computing / Adobe Flash

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:27
182Counterfeit / Packaging / Authentication / Public key infrastructure / Cryptography / Counterfeit consumer goods / Forgery

TPR0503AX Application Note How to combat Counterfeiting using VaultIC100

Add to Reading List

Source URL: www.insidesecure.com

Language: English
183Software architecture / Information / HTTP cookie / Internet privacy / Communications protocol / Model–view–controller / Cross-site request forgery / Web application framework / HTTP / Computing / Data

PDF Document

Add to Reading List

Source URL: web.sec.uni-passau.de

Language: English - Date: 2015-02-24 12:13:25
184Counterfeit / Forgery / Intellectual property organizations / Information / Intellectual property law / Union des Fabricants / Radio-frequency identification / Shanzhai / Copyright / Counterfeit consumer goods / Business / Crime

50 Years of Growth, Innovation and Leadership How to Win Your Anti-Counterfeiting War A Frost & Sullivan White Paper

Add to Reading List

Source URL: www.insidesecure.com

Language: English
185Money / Packaging / Payment systems / Forgery / Fraud / Authentication / Microprinting / Cheque fraud / Counterfeit / Business / Banking / Technology

Are Your Checks Safe? It is estimated that the first known check was written in the late 1650s in Europe and approximately 200 years, in the 1850s, checks became a common instrument for payment in the United States. Sinc

Add to Reading List

Source URL: www.printech.com

Language: English - Date: 2014-05-30 15:32:07
186Content management systems / Microsoft Visual Studio / Template engines / Blog software / ASP.NET / JSONP / WordPress / Cross-site request forgery / JavaScript / Software / Computing / Web application frameworks

Ywam.org Opportunies: Front-End Website Developers Our goal at ywam.org is to mobilize thousands more missionaries and to foster spiritual vitality and collaboraon within our mission. To see this happen we need more fr

Add to Reading List

Source URL: www.ywam.org

Language: English - Date: 2014-08-07 16:08:52
187Computer network security / Software testing / Cross-site scripting / Vulnerability / Acunetix / Rapid7 / Remote file inclusion / Qualys / Cross-site request forgery / Computer security / Cyberwarfare / Computing

State of the Art: Automated Black-Box Web Application Vulnerability Testing Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell Stanford University Stanford, CA {jbau, divijg}@stanford.edu, {elie, mitchell}@cs.stanford

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:31:25
188Cross-site scripting / Cross-site request forgery / Samy / Opa / Myspace / XMLHttpRequest / Ajax / XSS worm / Computing / World Wide Web / JavaScript

Six Degrees of XSSploitation Dan Moniz <> HD Moore <>

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:31
189Cascading Style Sheets / Ü / Web development / Cross-site request forgery / Software engineering / Software / Computing / Cross-platform software / JavaScript

  Job vacancy: Front End Developer Number of available position: 1

Add to Reading List

Source URL: www.yourfirsteuresjob.eu

Language: English - Date: 2015-04-23 08:59:12
190Crimes / Document forgery / Uttering / Crime / High treason in the United Kingdom / Law / Criminal law / English criminal law

CRIMINAL CODE Cap 195 – 29 December 1838 Amended 25/01; 30/01; 5/02; 12/03; 22/03; 30/03; 34/05; 24/06 ARRANGEMENT OF SECTIONS

Add to Reading List

Source URL: www.icla.up.ac.za

Language: English - Date: 2014-05-19 06:06:52
UPDATE