<--- Back to Details
First PageDocument Content
Asia / Kanchanaburi / Japanese war crimes / Beijing / The Bridge over the River Kwai / Glen Waverley /  Victoria / Kingsway /  Glen Waverley / The Bridge on the River Kwai / Burma Railway / Film / Transport / Rail transport in Thailand
Date: 2015-04-17 04:06:17
Asia
Kanchanaburi
Japanese war crimes
Beijing
The Bridge over the River Kwai
Glen Waverley
Victoria
Kingsway
Glen Waverley
The Bridge on the River Kwai
Burma Railway
Film
Transport
Rail transport in Thailand

Code: BX2RK-S-RS101Days River

Add to Reading List

Source URL: extragreen.com.au

Download Document from Source Website

File Size: 2,53 MB

Share Document on Facebook

Similar Documents

Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

DocID: 1xVcY - View Document

Information science / Collaboration / Humancomputer interaction / Information retrieval / Recommender systems / Human communication / Social information processing / Collective intelligence / Collaborative filtering / Computer-supported cooperative work / Personalization / GroupLens Research

GroupLink: Group Event Recommendations Using Personal Digital Traces Honghao Wei Tsinghua University Beijing, 100084, China

DocID: 1xV1p - View Document

Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

DocID: 1xUXT - View Document

Third Workshop on Script to Program Evolution STOP 2012 This year marks the third edition of the STOP workshop series, and a colocation with ECOOP and PLDI in Beijing, China. For this year’s STOP, the goal was to take

DocID: 1xTGU - View Document

Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

DocID: 1xTCv - View Document