Forgery

Results: 1137



#Item
751Political forgery / Religious persecution / The Protocols of the Elders of Zion / Communications protocol / Cryptographic protocol / Religion / Information / Deception / Integrism

Annual Fees 2014 Program Size (Based on number of active protocols*) Fee (US Dollars)

Add to Reading List

Source URL: admin.share.aahrpp.org

Language: English - Date: 2014-01-03 14:42:22
752Hacking / Software testing / Vulnerability / Cross-site request forgery / Cross-site scripting / C / Internet Explorer / Patch / Pwnie Awards / Computing / Cyberwarfare / Computer security

Retroactive Auditing Xi Wang Nickolai Zeldovich M. Frans Kaashoek MIT CSAIL ABSTRACT Retroactive auditing is a new approach for detecting past intrusions

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
753Affidavit / Act / Cheque / Acknowledgment / Certified copy / Notary / Law / Notary public

AFFIDAVIT ATTESTING TO FORGERY Chapter 3A[removed], FAC PLEASE TYPE OR PRINT ALL INFORMATION OTHER THAN SIGNATURES Affidavits must be received by the Department of Financial Services at the address listed below within 48 m

Add to Reading List

Source URL: www.myfloridacfo.com

Language: English - Date: 2013-01-22 15:41:42
754Deception / Numismatics / Crime / Counterfeit / Ethics / United States Secret Service / Money / Money forgery / Counterfeit money

Microsoft Word - Counterfeit Note Advisory 2005.doc

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-04-07 14:55:46
755Fancy cancel / Postmark / Art forgery / Philatelic fakes and forgeries / Philately / Postal markings / Cancellation

Fancy Cancels By Scott Trepel (Editort e llote: lhe foll,oatng e&ce"Pta Dete taken fron Mt. !!epeLt e tal,k at the Decenber 4 Roundtq.bl, e conducted bg The PhllateLic Foundq.tion and the Collecto"e Club. ) What you see

Add to Reading List

Source URL: www.philatelicfoundation.org

Language: English - Date: 2014-04-10 14:52:36
756Money / Cheque / Warrant / Affirmation in law / Payment systems / Finance / Business

CLAIMANT’S SUPPLEMENTARY STATEMENT (TO BE ATTACHED TO FORGERY AFFIDAVIT) To be fully completed by claimant (except for witnessing) in BLUE INK False statements in this affirmation may be subject to punishment under Neb

Add to Reading List

Source URL: www.treasurer.state.ne.us

Language: English - Date: 2002-03-29 09:31:56
757Handwriting recognition / Art forgery / Password / Biometrics / Pen computing / Authentication / Security / Cryptography / Passphrase

Evaluating the Security of Handwriting Biometrics Lucas Ballard Daniel Lopresti Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:47
758Hardstone carving / Culture / Eugène Boban / Crystal skull / Jane MacLaren Walsh / Olmec / Monte Verde / Pre-Columbian era / Mesoamerica / Archaeology / Americas / Archaeological forgery

ANTHRONOTES ® MUSEUM OF NATURAL HISTORY PUBLICATION FOR EDUCATORS VOLUME 26 NO. 1 SPRING 2005

Add to Reading List

Source URL: anthropology.si.edu

Language: English - Date: 2007-10-11 19:01:08
759Computer network security / Cross-site scripting / Penetration test / OWASP / Vulnerability / Cross-site request forgery / HTTP cookie / Computer security / Cyberwarfare / Software testing

Feeling insecure about your web testing? Who is being hacked?

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-08 23:39:48
760Software bugs / Cross-site request forgery / Cross-site scripting / Buffer overflow / SQL injection / Code injection / Uncontrolled format string / Cyberwarfare / Computer security / Failure

[removed]Uncontrolled Format String 212 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
UPDATE