Pax

Results: 1145



#Item
421Finance / Environmental /  Social and Corporate Governance / Environmentalism / Principles for Responsible Investment / Financial services / Portfolio manager / Investment management / Responsible Research / Pax World Funds / Financial economics / Ethical investment / Investment

ESG integration of mainstream Australian Equity Managers Study commissioned by the Australian Council of Super Investors Inc. and the Investment & Financial Services Association Limited

Add to Reading List

Source URL: www.acsi.org.au

Language: English - Date: 2012-04-19 22:30:22
422Chimpanzee / Guinea / CITES / Conakry / Gorilla / Apes / Africa / Earth

The Conakry Connection Karl Ammann, Klaus Sparwasser, Nick Cockayne, Claudia Schoene & Pax Animalis January 2013 with an update in April 2013

Add to Reading List

Source URL: www.pax-animalis.org

Language: English - Date: 2014-06-24 04:12:04
423

October 6, 2014 Pax Terminal World clip TAKE FIVE - Passenger Terminal World picks out five key technology trends that are set to revolutionize the airport

Add to Reading List

Source URL: www.miami-airport.com

- Date: 2014-10-27 11:00:13
    424Cyberwarfare / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Return-to-libc attack / Address space layout randomization / Stack / Zero-day attack / Software bugs / Computer security / Computing

    Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

    Add to Reading List

    Source URL: www.cs.vu.nl

    Language: English - Date: 2013-04-18 05:57:24
    425Human rights instruments / International law / International organizations / Peace / Pax Christi / Human Rights Watch / Convention on Cluster Munitions / Cluster munition / Convention on Certain Conventional Weapons / International relations / Laws of war / Mine action

    Microsoft Word - KRC_DelegationCCW_Nov2014

    Add to Reading List

    Source URL: www.stopkillerrobots.org

    Language: English - Date: 2014-11-05 11:05:43
    426Cyberwarfare / Buffer overflow / Stack buffer overflow / Vulnerability / PaX / Application checkpointing / Heap overflow / Valgrind / C standard library / Computing / Software bugs / Computer security

    Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    427Air Niugini / Moresby / Geography of Papua New Guinea / Oceania / Lamana Hotel / Three Mile /  Papua New Guinea / Geography of Oceania / Waigani / Port Moresby

    3D/2N PORT MORESBY, PAPUA NEW GUINEA BUSINESSMAN PACKAGE Validity: 16March – 30June 2015 HOTEL Extension(per pax/night) SGD

    Add to Reading List

    Source URL: www.deksair.com

    Language: English - Date: 2015-03-30 04:27:26
    428Virtual address space / Virtual memory / Computing / Software / Executable space protection / Address space layout randomization / PaX / System software

    The Design and Implementation of Address Space Layout Randomization (ASLR) in the Windows Research Kernel (WRK) Student: MAK Chung Leung Supervisor: Prof. Lin GU Introduction

    Add to Reading List

    Source URL: www.cse.ust.hk

    Language: English - Date: 2012-08-24 04:50:13
    429PAX8 / NK2 homeobox 1 / Pax genes / E2F1 / Follicular thyroid cancer / WWTR1 / Peroxisome proliferator-activated receptor gamma / Transfection / Apoptosis / Biology / Cell biology / Transcription factors

    OPEN Citation: Cell Death and Disease[removed], e729; doi:[removed]cddis[removed] & 2013 Macmillan Publishers Limited All rights reserved[removed]www.nature.com/cddis

    Add to Reading List

    Source URL: www.nature.com

    Language: English - Date: 2013-07-18 09:55:04
    430Linux kernel / RSBAC / Linux Security Modules / Access control / Mandatory access control / FLASK / Type enforcement / Grsecurity / PaX / Computer security / System software / Software

    RSBAC - a framework for enhanced Linux system security Marek Jawurek∗ RWTH-Aachen Abstract Operating systems traditionally bring their own means of protection against any kind of threats. But often the system’s secur

    Add to Reading List

    Source URL: www.rsbac.org

    Language: English - Date: 2006-05-02 09:37:02
    UPDATE