Forgery

Results: 1137



#Item
41Art history / Museology / Mortgage / Real estate appraisal / Authentication / Provenance / Authenticity in art / Catalogue raisonn / Art forgery / Connoisseur / Appraisal / Forensic science

IS IT "RIGHT"? EMERGING AUTHENTICATION EXPECTATIONS, BEST PRACTICES & NEW WAYS FORWARD IN THE WAKE OF KNOEDLER By Cindy Charleston-Rosenberg, ISA CAPP “Authentication is a matter of informed and reasoned opinion … t

Add to Reading List

Source URL: www.artappraisalfirm.com

Language: English - Date: 2016-06-01 10:54:57
42Computer network security / OWASP / Cross-site request forgery / Patch

AuthMatrix   Simplified  Authoriza2on  Tes2ng  for   Web  Applica2ons     About  Me  –  Mick  Ayzenberg  

Add to Reading List

Source URL: schd.ws

Language: English - Date: 2016-02-01 23:22:56
43Printmaking / Printing / Cartography / Forgery / Documents / Art forgery / Lithography / Early world maps / Counterfeit / Map / Intaglio / Philatelic fakes and forgeries

Truth and Lies: Tips to Identify Forgeries and Reproductions by Eliane Dotson Old World Auctions Although the topic of map thefts has been more prominent in the media recently,

Add to Reading List

Source URL: www.washmapsociety.org

Language: English - Date: 2016-06-15 15:11:30
44Forgery / Government procurement in the United States / United States administrative law / Counterfeit / Systems engineering / Counterfeit electronic components / Item Unique Identification

THE UNDER SECRETARY OF DEFENSEDEFENSE PENTAGON WASHINGTON, DCMAR

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2015-06-03 12:23:11
45Packaging / Biometrics / Identity documents / Engraving / Forgery / Biometric passport / Authentication / Security printing / Passport / Countries applying biometrics / Irish passport

2004 IEEE Conference on Technologies for Homeland Security, Cambridge, MA, April 21-22, 2004 Designing Identity Documents for Automated Screening Bruce Monk Chief Technology Officer, AssureTec Systems, Inc., Manchester,

Add to Reading List

Source URL: www.advancediddetection.com

Language: English - Date: 2012-06-02 14:08:12
46Identity documents / Document forgery / Identity document forgery / Security engineering / Magnetic stripe card / Identity document / Authentication / Card reader

FEATURES EASY TO USE  Fully automatic reading and authentication  Reads virtually ALL licenses and IDs in North America (optional International coverage available)  Simple and intuitive user interface

Add to Reading List

Source URL: www.advancediddetection.com

Language: English - Date: 2012-06-02 14:11:54
47Old Persian language / Twenty-seventh Dynasty of Egypt / Alphabets / Cyrus the Great / Cuneiform / Old Persian cuneiform / Elamite language / Xerxes I / Old Persian / Cuneiform script / Darius I / Iran

A New Inscription of Xerxes? One More Forgery

Add to Reading List

Source URL: www.achemenet.com

Language: English - Date: 2015-11-02 05:32:19
48Money forgery / Counterfeit money / Deception / Numismatics / Counterfeit / United States Secret Service / Serial code

DEPARTMENT OF HOMELAND SECURITY United States Secret Service COUNTERFEIT NOTE REPORT INSTRUCTIONS TO BANK: 1. Prepare and submit one copy of this completed form with each suspected counterfeit note to your local SECRET

Add to Reading List

Source URL: www.secretservice.gov

Language: English - Date: 2016-03-10 10:57:17
49Semiconductor device fabrication / Forgery / Counterfeit consumer goods / Counterfeit / Semiconductor sales leaders by year / Semiconductor Industry Association / Semiconductor industry / Semiconductor package / Semiconductor Equipment and Materials International / Semiconductor device / Integrated circuit / Reliability

Microsoft Word - SIA Anti-Counterfeiting Final White Paper 28 August 2013 with acknowledgements.docx

Add to Reading List

Source URL: www.semiconductors.org

Language: English - Date: 2016-05-27 22:13:02
50Cross-platform software / Data management / SQL / Relational database management systems / Transaction processing / SQL injection / Cross-site scripting / Column / JavaScript / Effi / Cross-site request forgery / Database trigger

Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, and Nickolai Zeldovich MIT CSAIL A BSTRACT

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-20 03:36:51
UPDATE