Forgery

Results: 1137



#Item
501Forgery / Law enforcement / Crime / Europol / Algirdas Šemeta / European Anti-fraud Office / European Union / European Commissioner for Taxation and Customs Union /  Audit and Anti-Fraud / Counterfeit consumer goods / Government / Counterfeit

EUROPEAN COMMISSION PRESS RELEASE Brussels, 6 October[removed]Operation REPLICA: 1.2 million counterfeit goods and

Add to Reading List

Source URL: europa.eu

Language: English
502Counterfeit consumer goods / Business / Counterfeit / Forgery / Piracy / Information security / Reverse engineering / Computer security / Security / Crime

Inhaltsverzeichnis[removed]Product and Know how Protection Guidelines

Add to Reading List

Source URL: www.china-iprhelpdesk.eu

Language: English - Date: 2014-03-26 04:09:58
503Ajax / Internet privacy / XML / XMLHttpRequest / Hypertext Transfer Protocol / HTTP cookie / Cross-site request forgery / Proxy server / Cross-Origin Resource Sharing / Computing / Software / HTTP

index A abort method 20 Accept header 180 Accept-Charset header 18 Accept-Encoding header 18

Add to Reading List

Source URL: www.manning.com

Language: English - Date: 2014-10-14 12:43:26
504Justice / Criminal justice / Probation / Discharge / Misdemeanor / United States federal probation and supervised release / Criminal law / Law / Punishments

Case Number: 14CR19409 Case Name: The People of the State of Illinois v. Sam Kwartowski County: Cook Conviction Date: [removed]IWCC Case Number: N/A Offense: Forgery (Class 3 felony) pursuant to 720 ILCS[removed]a)(1)

Add to Reading List

Source URL: insurance.illinois.gov

Language: English - Date: 2014-12-10 12:31:20
505CZK / Rolex / Culture / Luxury brands / Counterfeit / Forgery

DOC Document

Add to Reading List

Source URL: www.coi.cz

Language: English - Date: 2014-10-02 03:41:35
506JavaScript / World Wide Web / Man-in-the-middle attack / Malware / Form / Password / Cross-site request forgery / Computing / Software / Cross-platform software

HProxy: Client-side detection of SSL stripping attacks Nick Nikiforakis, Yves Younan, and Wouter Joosen IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:05:57
507HTTP / Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / HTTP cookie / Google Chrome / HTTP Strict Transport Security / JavaScript / Computing / Software / Computer security

Large-scale Security Analysis of the Web: Challenges and Findings Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, and Wouter Joosen iMinds-DistriNet, KU Leuven 3001 Leuven, Belgium

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-05-19 11:26:35
508Security / OWASP / XLA / Cross-site request forgery / Threat / DA-Notice / Computing / Computer security / Cyberwarfare / Computer network security

XLA − Xtract Presentation, December 18, 2014  Confidential and Proprietary Excellence Always. Introduction 1. Automation needed to handle EINSTEIN (E3A) notices:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 17:04:43
509Cyberwarfare / Computer security / Internet privacy / Session fixation / HTTP cookie / Cross-site request forgery / Session / Cross-site scripting / Stateless protocol / Computing / Network protocols / HTTP

Serene: Self-Reliant Client-Side Protection against Session Fixation? Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, and Wouter Joosen IBBT-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastna

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:12
510Intellectual property / Trademark / Crime / Culture / Business / Counterfeit / Forgery / Crocs

DOC Document

Add to Reading List

Source URL: www.coi.cz

Language: English - Date: 2014-09-17 03:22:07
UPDATE