Memory protection

Results: 165



#Item
41

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-05 07:38:12
42Virginia Department of Criminal Justice Services Model Policy on Lineups/Eyewitness Identification November 16, 2011 A law enforcement agency should attach the highest priority to the protection of the citizens that

Virginia Department of Criminal Justice Services Model Policy on Lineups/Eyewitness Identification November 16, 2011 A law enforcement agency should attach the highest priority to the protection of the citizens that

Add to Reading List

Source URL: www.innocenceproject.org

Language: English - Date: 2015-03-03 16:20:01
43Journal of Consumer Research, Inc.  Memories as Assets: Strategic Memory Protection in Choice over Time Author(s): Gal Zauberman, Rebecca K. Ratner, and B. Kyu Kim Source: Journal of Consumer Research, Vol. 35, No.

Journal of Consumer Research, Inc. Memories as Assets: Strategic Memory Protection in Choice over Time Author(s): Gal Zauberman, Rebecca K. Ratner, and B. Kyu Kim Source: Journal of Consumer Research, Vol. 35, No.

Add to Reading List

Source URL: www.ejcr.org

Language: English - Date: 2014-09-02 15:24:03
44Microsoft Word - Calculating Yield in Sprayfoam Applications, June

Microsoft Word - Calculating Yield in Sprayfoam Applications, June

Add to Reading List

Source URL: www.masonknowles.com

Language: English - Date: 2011-09-07 14:59:50
45

PDF Document

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-01 09:34:28
46Thinfilm Memory Label for Brand Protection  Protect your product or brand from counterfeiting and tampering Forensic security plus in-field analysis and verification – all at the price of a hologram.

Thinfilm Memory Label for Brand Protection Protect your product or brand from counterfeiting and tampering Forensic security plus in-field analysis and verification – all at the price of a hologram.

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2014-12-15 19:16:34
47Memory Hole: Cryptographic protection for e-mail headers Daniel Kahn Gillmor <> IETF 92 Dallas, March 2015

Memory Hole: Cryptographic protection for e-mail headers Daniel Kahn Gillmor <> IETF 92 Dallas, March 2015

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-22 21:24:43
48Memory Segmentation to Support Secure Applications Student: Jonathan Woodruff Supervisor: Simon W. Moore Project Lead: Robert N. M. Watson University of Cambridge, Computer Laboratory

Memory Segmentation to Support Secure Applications Student: Jonathan Woodruff Supervisor: Simon W. Moore Project Lead: Robert N. M. Watson University of Cambridge, Computer Laboratory

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-30 09:46:42
49SD カードのコンテンツ保護 Content Protection for SD Memory Card 上林  達  下田 乾二

SD カードのコンテンツ保護 Content Protection for SD Memory Card 上林  達 下田 乾二

Add to Reading List

Source URL: www.toshiba.co.jp

Language: Japanese - Date: 2007-06-28 03:56:34
    50Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

    Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:21