ProActive

Results: 1901



#Item
21Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report May 10, 2014

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report May 10, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-05-10 12:23:53
    22Brief Announcement: Proactive Secret Sharing with a Dishonest Majority Shlomi Dolev Karim ElDefrawy

    Brief Announcement: Proactive Secret Sharing with a Dishonest Majority Shlomi Dolev Karim ElDefrawy

    Add to Reading List

    Source URL: web.cs.ucla.edu

    Language: English - Date: 2017-11-29 01:25:51
      23AIS Youth Protection Guidelines  AIS Youth Protection Policy Guidelines General These AIS Youth Protection Policy Guidelines are designed to help protect our youth in a proactive manner against verbal and sexual abuse (h

      AIS Youth Protection Guidelines AIS Youth Protection Policy Guidelines General These AIS Youth Protection Policy Guidelines are designed to help protect our youth in a proactive manner against verbal and sexual abuse (h

      Add to Reading List

      Source URL: www.irises.org

      Language: English - Date: 2011-02-17 17:25:55
        24OWASP Top Ten Proactive Controls Project  About	OWASP The Open Web Application Security Project (OWASP) is a 501c3 non for profit educational charity dedicated to enabling organizations to design, develop, acquire, oper

        OWASP Top Ten Proactive Controls Project About OWASP The Open Web Application Security Project (OWASP) is a 501c3 non for profit educational charity dedicated to enabling organizations to design, develop, acquire, oper

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2018-05-07 08:53:46
          25Training Proactive Web Defense A three-day training course in web application security and secure coding practices, helping to ensure that your software is resilient to attacks from even the most advanced threats

          Training Proactive Web Defense A three-day training course in web application security and secure coding practices, helping to ensure that your software is resilient to attacks from even the most advanced threats

          Add to Reading List

          Source URL: www.mwrinfosecurity.com

          Language: English - Date: 2016-07-28 07:11:18
            26SEPTEMBER 2016: A POSITION PAPER PRESENTED BY THE GLOBAL AVIATION INDUSTRY AVIATION INDUSTRY VIEWS ON CORSIA The aviation industry is committed to taking a proactive and responsible approach to development, balancing the

            SEPTEMBER 2016: A POSITION PAPER PRESENTED BY THE GLOBAL AVIATION INDUSTRY AVIATION INDUSTRY VIEWS ON CORSIA The aviation industry is committed to taking a proactive and responsible approach to development, balancing the

            Add to Reading List

            Source URL: aviationbenefits.org

            Language: English - Date: 2016-09-14 08:33:13
              27Everybody Wins in Divestitures New Bain & Company research finds that a systematic and proactive approach to divesting helps companies outperform the market. By Jim Wininger and Jorge Rujana

              Everybody Wins in Divestitures New Bain & Company research finds that a systematic and proactive approach to divesting helps companies outperform the market. By Jim Wininger and Jorge Rujana

              Add to Reading List

              Source URL: bain.de

              Language: English - Date: 2017-09-21 07:26:52
                28Proactive Synthesis of Recursive Tree-to-String Functions from Examples∗† Mikaël Mayer1 , Jad Hamza1 , and Viktor Kunčak1 1  EPFL IC IINFCOM LARA, INR 318, Station 14, CH-1015 Lausanne

                Proactive Synthesis of Recursive Tree-to-String Functions from Examples∗† Mikaël Mayer1 , Jad Hamza1 , and Viktor Kunčak1 1 EPFL IC IINFCOM LARA, INR 318, Station 14, CH-1015 Lausanne

                Add to Reading List

                Source URL: lara.epfl.ch

                - Date: 2017-06-19 03:51:05
                  29High Speed Networks Need Proactive Congestion Control Lavanya Jose? , Lisa Yan? , Mohammad Alizadeh† , George Varghese‡ , Nick McKeown? , Sachin Katti? ? Stanford University, † Massachusetts Institute of Technology

                  High Speed Networks Need Proactive Congestion Control Lavanya Jose? , Lisa Yan? , Mohammad Alizadeh† , George Varghese‡ , Nick McKeown? , Sachin Katti? ? Stanford University, † Massachusetts Institute of Technology

                  Add to Reading List

                  Source URL: conferences.sigcomm.org

                  - Date: 2015-10-30 12:24:15
                    30WORKING WITH SEX OFFENDERS A two day course for non-specialists Aim of the course: To enable participants to take a proactive role in the management of sex offenders for whom they may provide a range of services includin

                    WORKING WITH SEX OFFENDERS A two day course for non-specialists Aim of the course: To enable participants to take a proactive role in the management of sex offenders for whom they may provide a range of services includin

                    Add to Reading List

                    Source URL: www.tdi.org.uk

                    - Date: 2018-01-11 10:41:35