Document forgery

Results: 78



#Item
1Document forgery / Identity document forgery / Security engineering / Identity document / United States Passport Card / National security / Security / International relations

Start Protecting Your Business and Customers Today! Fulfilling the ID Verification Needs in these Enterprises:

Add to Reading List

Source URL: www.advancediddetection.com

Language: English - Date: 2012-06-02 14:11:38
2Security / Identity documents / Passports / National security / Prevention / Radio-frequency identification / Biometrics / Biometric passport / Data security / Identity document forgery / Identity document / Machine-readable passport

2004 IEEE Conference on Technologies for Homeland Security, Cambridge, MA, April 21-22, 2004 Automated Authentication of Current Identity Documents Theodore Kuklinski, Ph.D. Director of Research, AssureTec Systems, Inc.

Add to Reading List

Source URL: www.advancediddetection.com

Language: English - Date: 2012-06-02 14:07:35
3Identity documents / Biometrics / Document forgery / Identity document forgery / Security engineering / Biometric passport / Identity document / Authentication / REAL ID Act / Photo identification / Radio-frequency identification / National identity cards in the European Economic Area

Microsoft Word - Segment 001 of The Use Of RA.doc

Add to Reading List

Source URL: www.advancediddetection.com

Language: English - Date: 2012-06-02 14:06:34
4Identity documents / Document forgery / Identity document forgery / Security engineering / Magnetic stripe card / Identity document / Authentication / Card reader

FEATURES EASY TO USE  Fully automatic reading and authentication  Reads virtually ALL licenses and IDs in North America (optional International coverage available)  Simple and intuitive user interface

Add to Reading List

Source URL: www.advancediddetection.com

Language: English - Date: 2012-06-02 14:11:54
5Cryptography / Criminology / Forensic science / Heuristics / Online and offline / Computer security / Art forgery

Call for Participation Signature Verification Competition On- and Offline Skilled Forgeries http://sigcomp09.arsforensica.org 10th International Conference on Document Analysis and Recognition

Add to Reading List

Source URL: www.cvc.uab.es

Language: English - Date: 2009-01-20 10:13:08
6Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
7Cross-platform software / Scripting languages / Cloud clients / Portable software / Firefox add-ons / Cross-site request forgery / Firebug / JavaScript / Cross-site scripting / Chromium / Google Chrome / Firefox

Institute of Distributed Systems Ulm University Preparation Document

Add to Reading List

Source URL: cmichi.github.io

Language: English - Date: 2014-07-09 05:38:52
8Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: www.security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
9Computer network security / Software testing / Hacking / Vulnerability / CVSS / Cross-site scripting / Cross-site request forgery / Code injection / SQL injection / Cyberwarfare / Computer security / Computing

Web Application Scan Document Revision Initial Report Prepared By: AppCheck-NG

Add to Reading List

Source URL: appcheck-ng.com

Language: English - Date: 2014-09-08 05:22:28
10Computing / Security / Network protocols / OWASP / HTTP / Cross-site request forgery / Cross-site scripting / HTTP cookie / Web application security / Computer security / Cyberwarfare / Computer network security

OWASP RUBY ON RAILS SECURITY GUIDE 2009 V2.0 © OWASP Foundation This document is licensed under the Creative Commons Attribution-Share Alike 3.0 license. You must attribute your version to the OWASP Testing or

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:27
UPDATE