Universally unique identifier

Results: 107



#Item
51Flashback: Licensing Malware To Hinder Analysis and Functionality Author:	
  Daryl	
  Ashley,	
  [removed]	
   Senior	
  Network	
  Security	
  Analyst	
   April	
  24,	
  2012	
   	
  

Flashback: Licensing Malware To Hinder Analysis and Functionality Author:  Daryl  Ashley,  [removed]   Senior  Network  Security  Analyst   April  24,  2012    

Add to Reading List

Source URL: security.utexas.edu

Language: English - Date: 2012-04-27 11:42:19
52BEST PRACTICES: BEACON LOCATION SECURITY AND ENCRYPTION JAMES BUCHHEIM, CEO  BEACONS OVERVIEW

BEST PRACTICES: BEACON LOCATION SECURITY AND ENCRYPTION JAMES BUCHHEIM, CEO BEACONS OVERVIEW

Add to Reading List

Source URL: opusresearch.net

Language: English - Date: 2014-07-30 15:24:24
53GeoBase - Identification Rules and Change Management, Edition 1.0

GeoBase - Identification Rules and Change Management, Edition 1.0

Add to Reading List

Source URL: geobase.ca

Language: English - Date: 2012-11-07 13:48:29
54NRWN demo - information sheet

NRWN demo - information sheet

Add to Reading List

Source URL: www.geobase.ca

Language: English - Date: 2011-12-15 10:39:25
55Intro to the Atom Publishing Protocol Joe Gregorio Google  Atom

Intro to the Atom Publishing Protocol Joe Gregorio Google Atom

Add to Reading List

Source URL: bitworking.org

Language: English - Date: 2014-04-19 11:07:27
56Identifiers / Markup languages / Technical communication / Computer file formats / XML / Universally unique identifier / Globally unique identifier / HTML element / Windows Media Center / Computing / Universal identifiers / Web standards

Implementing the SourceType XML Element in PBDA Devices Guidelines for Independent Hardware Vendors July 9, 2009  Abstract This white paper provides information about the SourceType XML element of the Protected Broadc

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2009-07-13 18:25:54
57MAPPING DIGITAL FORENSICS METADATA TO PRESERVATION EVENTS USING BITCURATOR Alexandra Chassanoff, Kam Woods, Christopher Lee School of Information and Library Science, University of North Carolina at Chapel Hill  The BitC

MAPPING DIGITAL FORENSICS METADATA TO PRESERVATION EVENTS USING BITCURATOR Alexandra Chassanoff, Kam Woods, Christopher Lee School of Information and Library Science, University of North Carolina at Chapel Hill The BitC

Add to Reading List

Source URL: files.archivists.org

Language: English - Date: 2013-09-06 14:20:27
58IPTC Information Interchange Model / International Press Telecommunications Council / Universally unique identifier / JPEG / MetaLith / Metadata / Information / Data

ISO/IEC JTC 1/SC 29/WG1 N2600 Date: 19 July 2002

Add to Reading List

Source URL: www.jpeg.org

Language: English - Date: 2003-11-28 07:32:25
59OSX/Flashback The first malware to infect hundreds of thousands of Apple Mac OSX/Flashback

OSX/Flashback The first malware to infect hundreds of thousands of Apple Mac OSX/Flashback

Add to Reading List

Source URL: go.eset.com

Language: English - Date: 2012-09-19 10:26:53
60Internet Draft Document: draft-kindberg-tag-uri-00.txt Expires: October 1, 2001 Tim Kindberg Hewlett-Packard Corporation

Internet Draft Document: draft-kindberg-tag-uri-00.txt Expires: October 1, 2001 Tim Kindberg Hewlett-Packard Corporation

Add to Reading List

Source URL: www.taguri.org.

Language: English - Date: 2004-02-12 15:01:10