Memory protection

Results: 165



#Item
41GPGPU / Nvidia / Graphics hardware / CUDA / Graphics processing unit / Memory protection / GeForce / Side channel attack / Cold boot attack / Computer hardware / Video cards / Computing

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-05 07:38:12
42Justice / Crime / Eyewitness identification / Eyewitness memory / Witness / Mistaken identity / Suspect / DNA profiling / Gary L. Wells / Criminal law / Criminal justice / Law

Virginia Department of Criminal Justice Services Model Policy on Lineups/Eyewitness Identification November 16, 2011 A law enforcement agency should attach the highest priority to the protection of the citizens that

Add to Reading List

Source URL: www.innocenceproject.org

Language: English - Date: 2015-03-03 16:20:01
43Psychology / Cognitive science / Neuropsychological assessment / Recall / Emotion and memory / Flashbulb memory / Mind / Memory / Mental processes

Journal of Consumer Research, Inc. Memories as Assets: Strategic Memory Protection in Choice over Time Author(s): Gal Zauberman, Rebecca K. Ratner, and B. Kyu Kim Source: Journal of Consumer Research, Vol. 35, No.

Add to Reading List

Source URL: www.ejcr.org

Language: English - Date: 2014-09-02 15:24:03
44Foams / Building insulation materials / Heat transfer / Thermal protection / Chemistry / R-value / Mat / Insulation / Memory foam / Mechanical engineering / Chemical engineering / Insulators

Microsoft Word - Calculating Yield in Sprayfoam Applications, June

Add to Reading List

Source URL: www.masonknowles.com

Language: English - Date: 2011-09-07 14:59:50
45Computer programming / Pointer / Capability-based security / C / Memory protection / Computing / Software engineering / Procedural programming languages

PDF Document

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-01 09:34:28
46Brand management / Thin Film Electronics ASA / Counterfeit consumer goods / Non-volatile memory / Label / Brand / Authentication / Packaging and labeling / Luxury good / Marketing / Business / Technology

Thinfilm Memory Label for Brand Protection Protect your product or brand from counterfeiting and tampering Forensic security plus in-field analysis and verification – all at the price of a hologram.

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2014-12-15 19:16:34
47Internet / Internet standards / HTTP / MIME / Cryptographic protocols / Internet media type / DomainKeys Identified Mail / Cypherpunk anonymous remailer / Computing / Email / OSI protocols

Memory Hole: Cryptographic protection for e-mail headers Daniel Kahn Gillmor <> IETF 92 Dallas, March 2015

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-22 21:24:43
48X86 architecture / Memory protection / X86 memory segmentation / Virtual memory / Capability-based addressing / X86 / Intel iAPX 432 / Memory address / Ring / Computer architecture / Memory management / Computing

Memory Segmentation to Support Secure Applications Student: Jonathan Woodruff Supervisor: Simon W. Moore Project Lead: Robert N. M. Watson University of Cambridge, Computer Laboratory

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-30 09:46:42
49

SD カードのコンテンツ保護 Content Protection for SD Memory Card 上林  達 下田 乾二

Add to Reading List

Source URL: www.toshiba.co.jp

Language: Japanese - Date: 2007-06-28 03:56:34
    50Computer errors / Machine code / Memory management / Segmentation fault / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Pointer / Brainfuck / Computing / Software bugs / Software engineering

    Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:21
    UPDATE