Doc

Results: 908330



#Item
41Computing / Computer access control / Computer security / Cloud standards / Federated identity / Security / OAuth / Cross-site request forgery / OpenID / Cross-site scripting / Social login / HTTP cookie

Discovering Concrete Attacks on Website Authorization by Formal Analysis

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-01-06 10:29:30
42Financial Industry Regulatory Authority / United States securities law / Self-regulatory organization / Law / Regulation / Government / Selling away

Microsoft Word - WMBAA Letter to FINRA re NASD Rule 1017.doc

Add to Reading List

Source URL: www.wmbaa.com

Language: English - Date: 2015-05-20 18:24:19
43

A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud Daniele Filaretti

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-04-07 04:56:31
    44Process calculi / Theoretical computer science / -calculus / Process calculus / Computability theory / Markov models / Computer science / Normal distribution / Cognitive science / Algorithm characterizations

    Modelling Dynamic Web Data ? Philippa Gardner, Sergio Maffeis ∗ Department of Computing 180 Queen’s Gate, South Kensington Campus, Imperial College London SW7 2AZ, UK.

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2009-08-14 07:09:04
    45Cloud computing / Cloud infrastructure / Computing / IT infrastructure / IBM cloud computing / Rosetta@home / Cloud storage / Infrastructure as a service / Asigra / Kaavo

    Microsoft Word - escience2011Rosetta-final.doc

    Add to Reading List

    Source URL: www.cloudbroker.com

    Language: English - Date: 2012-01-23 08:00:43
    46

    Microsoft Word103_i_V3.0.doc

    Add to Reading List

    Source URL: www.arbeit.swiss

    Language: Italian
      47Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

      The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2016-01-15 12:55:59
      48Education / Human behavior / Educational stages / Tertiary education / Training / Apprenticeship / Occupations / Vocational education / Electrician / Vocational school / Master craftsman

      Microsoft Word - fpw_scanj_revision.doc

      Add to Reading List

      Source URL: econ.lse.ac.uk

      Language: English - Date: 2008-04-25 06:42:44
      49

      Microsoft Wordi_1.1.doc

      Add to Reading List

      Source URL: www.arbeit.swiss

      Language: Italian
        50

        PDF Document

        Add to Reading List

        Source URL: www.bis.doc.gov

        - Date: 2018-08-20 09:55:04
          UPDATE