Forgery

Results: 1137



#Item
381Cultural studies / Australian Aboriginal art / Art history / John Myatt / Art forgery / Art theft / Australian art / John Drewe / Art dealer / Cultural economics / Visual arts / Arts in Australia

WHO WINS AND WHO LOSES WHEN ART IS STOLEN OR FORGED? Professor Ken Polk Department of Criminology, University of Melbourne, Vic

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-06-04 14:36:34
382Deception / Theft / Australian Aboriginal art / Art forgery / Forgery / Art theft / Indigenous Australian art / Organized crime / Australian art / Ethics / Crimes / Law

OPENING ADDRESS Senator Amanda Vanstone Minister for Justice and Customs Paper presented at the Art Crime

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-06-04 14:36:33
383English criminal law / Forgery

page < PAGE >2 Acts—2006 Acts—2008 page < PAGE >7< COMMENTS * MERGEFORMAT >< KEYWORDS * MERGEFORMAT >< COMMENTS * MERGEFORMAT >< KEYWORDS * MERGEFORMAT >

Add to Reading List

Source URL: www.legislation.act.gov.au

Language: English - Date: 2012-09-10 23:47:35
384Stationery / Watermark / Money / Currency / Money forgery / Banknotes / Papermaking

Clearing and Settlement Systems Bill

Add to Reading List

Source URL: www.hkma.gov.hk

Language: English - Date: 2015-01-09 04:35:58
385Packaging / Security / Security printing / Printing / Visual arts / Business / Banknotes / Engraving / Forgery

StarPerf Exploring new dimensions in banknote protection ® At Orell Füssli Security Printing, tradition meets high-tech. StarPerf®, a security feature based on micro-perforation technology,

Add to Reading List

Source URL: www.ofs.ch

Language: English - Date: 2012-12-14 08:38:17
386

Forgery Observator L’Osservatorio Contraffazione è una soluzione integrata di verifica dell’eventuale contraffazione di documenti e banconote e di analisi delle rilevazioni effettuate sul

Add to Reading List

Source URL: www.theorematica.it

Language: Italian - Date: 2014-06-27 04:08:39
    387Hacking / Cross-site scripting / HTTP / PHP programming language / Cross-platform software / Scripting languages / Cross-site request forgery / Code injection / HTTP cookie / Computing / Computer security / Cyberwarfare

    Multilayer Web Security Author: Date: Place: Online: License:

    Add to Reading List

    Source URL: events.linuxfoundation.org

    Language: English - Date: 2013-10-16 23:46:57
    388Computer network security / Cross-site scripting / Software testing / Cross-site request forgery / Vulnerability / SQL injection / Web application security / Cross-application scripting / XSS worm / Cyberwarfare / Computer security / Failure

    WEB APPLICATION SECURITY DOS AND DON’TS M. Waseem & A. Mateen 23rd May 2013 @folio_3

    Add to Reading List

    Source URL: speakerd.s3.amazonaws.com

    Language: English - Date: 2015-02-06 05:30:56
    389Literature / Christianity / Galen / Humanities / Forgery / Literary forgery / Art forgery / Bruce M. Metzger / New Testament / Apocrypha / Jewish literature / Pseudepigraph

    Literary Forgeries and Canonical Pseudepigrapha Author(s): Bruce M. Metzger Reviewed work(s): Source: Journal of Biblical Literature, Vol. 91, No. 1 (Mar., 1972), pp[removed]Published by: The Society of Biblical Literature

    Add to Reading List

    Source URL: sbl-site.org

    Language: English - Date: 2014-01-10 12:47:19
    390Network architecture / DNS rebinding / Cross-site request forgery / Dynamic Host Configuration Protocol / Denial-of-service attack / Proxy server / Internet protocol suite / Router / Firewall / Computing / Computer network security / Internet

    Remote Attacks Against SOHO Routers 08 February, 2010 Craig Heffner Abstract This paper will describe how many consumer (SOHO) routers can be exploited via DNS re-binding to

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English
    UPDATE