Zero-day

Results: 689



#Item
311Computing / Internet privacy / Internet protocols / NSD / Name server / Computer network security / Hacking / Server / Tor / Internet / Domain name system / System software

Product Documentation Hybrid DNS Benefits • Mitigate risk before attacks take down your business • Protect against zero-day vulnerabilities

Add to Reading List

Source URL: www.efficientip.com

Language: English - Date: 2014-09-30 11:06:35
312

Produktbeschreibung Hybrid DNS Engine DIE Antwort auf DNS Zero Day Sicherheitslücken

Add to Reading List

Source URL: www.efficientip.com

Language: German - Date: 2015-03-16 09:04:51
    313Reproductive health / Health / Social philosophy / Medicine / Comfort Momoh / Prevalence of female genital mutilation by country / Female genital mutilation / International Day of Zero Tolerance to Female Genital Mutilation / International Federation of University Women

    The International Federation of University Women (IFUW) and [NFA NAME] call for increased access to education to stop the practice of female genital mutilation (FGM) - FGM impedes girls’ full educational attainment [CI

    Add to Reading List

    Source URL: www.afgw.org.au

    Language: English - Date: 2014-01-22 17:54:17
    314Environmental social science / Industrial ecology / Waste / Eco-innovation / Zero waste / Environment / Sustainability / Environmentalism

    Information Day Horizon 2020 Societal Challenge: Climate Action, Environment, Resource Efficiency and Raw Materials 2015 Calls 17 November 2014 Albert Borschette Conference Centre (CCAB), Brussels

    Add to Reading List

    Source URL: ec.europa.eu

    Language: English - Date: 2014-10-21 07:36:49
    315Medicine / AIDS pandemic / HIV/AIDS in Asia / AIDS / HIV / HIV/AIDS in China / HIV/AIDS in Uganda / HIV/AIDS / Health / Pandemics

    UNAIDS World AIDS Day Report | 2011 How to get to zero: Faster. Smarter.

    Add to Reading List

    Source URL: www.trevorcullen.id.au

    Language: English - Date: 2012-10-30 00:00:40
    316Finance / Investment / Day trading / Proprietary trading / Futures contract / Zero–sum game / Day trader / Efficient-market hypothesis / Scalping / Stock market / Financial economics / Financial markets

    The Winners and Losers of the Zero-Sum Game: The Origins of Trading Profits, Price Efficiency and Market Liquidity Lawrence Harris* *Professor of Finance

    Add to Reading List

    Source URL: aiinfinance.com

    Language: English - Date: 2012-06-26 15:17:35
    317AIDS / Condom / Sexually transmitted disease / HIV / Safe sex / Female condom / HIV/AIDS in China / Serosorting / HIV/AIDS / Medicine / Health

    Getting to Zero World AIDS Day | December 1 www.worldaidsdaysa.org.au WHO SHOULD

    Add to Reading List

    Source URL: www.rasa.org.au

    Language: English - Date: 2014-11-27 17:38:01
    318Computer network security / Hacking / Software testing / Vulnerability / Zero-day attack / Patch / Transdermal patch / United States Computer Emergency Readiness Team / Patch Tuesday / Computer security / Cyberwarfare / Computing

    PATCH MANAGEMENT February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

    Add to Reading List

    Source URL: www.infosec.gov.hk

    Language: English - Date: 2009-06-15 09:06:19
    319Reproductive health / Medicine / Genital mutilation / Health / Social philosophy / Prevalence of female genital mutilation by country / RAINBO / Female genital mutilation / International Day of Zero Tolerance to Female Genital Mutilation / International Federation of Gynaecology and Obstetrics

    FIGO reaffirms support for 2014’s International Day of Zero Tolerance to Female Genital Mutilation (6 February[removed]The International Day of Zero Tolerance to Female Genital Mutilation (FGM) - held each 6 February - e

    Add to Reading List

    Source URL: www.figo.org

    Language: English - Date: 2014-11-17 08:15:09
    320Computer security / Computer network security / Hacking / Malware / Social engineering / Targeted threat / Zero-day attack / Vulnerability / Phishing / Cybercrime / Cyberwarfare / Computer crimes

    BLURRING BOUNDARIES Trend Micro Security Predictions for 2014 and Beyond Distributed by: Predictions

    Add to Reading List

    Source URL: www.itu.int

    Language: English - Date: 2014-03-24 05:06:55
    UPDATE