Forgery

Results: 1137



#Item
251Political forgery / Religious persecution / The Protocols of the Elders of Zion / Communications protocol / Cryptographic protocol / Religion / Information / Deception / Integrism

Annual Fees 2015 Program Size (Based on number of active protocols*) Fee (US Dollars)

Add to Reading List

Source URL: admin.share.aahrpp.org

Language: English - Date: 2014-12-18 16:11:38
252Computer network security / Cross-site scripting / Cross-site request forgery / JavaScript / Rapid7 / Instructure / Penetration test / Resolution / SQL injection / Computer security / Computing / Software

CANVAS by Instructure Bugcrowd Flex Program Results December 2014 Executive Summary Bugcrowd Inc was engaged by Instructure to perform a Flex Bounty program, commonly known

Add to Reading List

Source URL: www.canvaslms.com

Language: English - Date: 2015-04-14 16:58:35
253Internet / Internet privacy / Computer network security / Domain name system / HTTP cookie / Key management / Cross-site request forgery / Session fixation / Session hijacking / Computing / Software / HTTP

Origin Cookies: Session Integrity for Web Applications Andrew Bortz Stanford University [removed]

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
254Crime / Business / WWE / Entertainment / Counterfeit consumer goods / Counterfeit / Forgery

ONLINE COUNTERFEITING May 2007 www.stores.org Putting a Headlock

Add to Reading List

Source URL: www.markmonitor.com

Language: English - Date: 2013-03-20 20:05:41
255English criminal law / Forgery / Sexual Offences (Amendment) Act

No. 20 of[removed]The Law Revision (Miscellaneous) (Amendments) (No. 3) Act, [removed]

Add to Reading List

Source URL: laws.gov.ag

Language: English - Date: 2008-01-29 18:26:47
256Cryptographic protocols / HTTP / Internet protocols / Spring Security / Cross-site request forgery / Lightweight Directory Access Protocol / Java Authentication and Authorization Service / Authentication / WebSocket / Computing / Java enterprise platform / Directory services

Spring Security Reference

Add to Reading List

Source URL: docs.spring.io

Language: English - Date: 2015-03-25 23:19:32
257Web browsers / Portable software / HTTP / HTTP cookie / Google Chrome / JavaScript / Cross-site request forgery / Bookmark / Password / Software / Computing / Internet privacy

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2015-01-08 09:27:47
258Indigenous Australian art / Australian art / Art theft / Kathleen Petyarre / Art forgery / Fence / Art / Possession of stolen goods / Art and Crime / Theft / Crimes / Market reduction approach

Art crime in Australia : a market analysis

Add to Reading List

Source URL: www.anzsoc.org

Language: English - Date: 2009-04-20 01:21:57
259Forgery / Deception / Autograph / Counterfeit / Authenticity in art / Philatelic fakes and forgeries / Crime / Ethics / Art forgery

Careful Collecting: Fakes and Forgeries John collects baseball cards. His favorite team is the Houston Astros, and he has complete team sets going back toThough they are not Astros, John has begun to collect cards

Add to Reading List

Source URL: www.spurlock.illinois.edu

Language: English - Date: 1999-11-05 13:28:18
260Counterfeit / Forgery

SIXTY-EIGHTH WORLD HEALTH ASSEMBLY Provisional agenda item 17.3 A68[removed]March 2015

Add to Reading List

Source URL: apps.who.int

Language: English - Date: 2015-03-20 11:13:48
UPDATE