Z code

Results: 536



#Item
101Obfuscated code / Obfuscation / Source code / International Obfuscated C Code Contest / Computer programming / Computing / Software engineering

I t z i k K o t l e r | M a yLet Me Stuxnet You Itzik Kotler C TO , S e c u r i t y A r t

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-28 00:11:34
102International Maritime Organization / Water transport / International relations / International Convention for the Safety of Life at Sea / STCW / International Maritime Law Institute / Marine Engineering and Research Institute / World Maritime University / International Ship and Port Facility Security Code / Transport / Law of the sea / Water

IM NEWS T H E M A G A Z I N E O F T H E I N T E R N AT I O N A L M A R I T I M E O R G A N I Z AT I O N

Add to Reading List

Source URL: www.imo.org

Language: English - Date: 2011-09-06 10:51:58
103Water transport / International Maritime Organization / Maritime Security Regimes / International Ship and Port Facility Security Code / IMO ship identification number / International Convention for the Safety of Life at Sea / Transport / Law of the sea / Water

T H E M A G A Z I N E O F T H E I N T E R N AT I O N A L M A R I T I M E O R G A N I Z AT I O N ISSUEISSUE

Add to Reading List

Source URL: www.imo.org

Language: English - Date: 2011-09-06 09:27:29
104Encodings / G-code / Numerical control / Cartesian coordinate system / Indramat / Technology / Mathematics / Geometry / Computer-aided engineering

CNC 3-axis module - Z-axis can be equipped with a MAX 5 B, page 3.2 of our catalog, which makes the TRIAX 2 a self-contained, high-performance and precise 3-axis CNC machining center within

Add to Reading List

Source URL: www.somex.fr

Language: English - Date: 2010-12-10 07:44:28
105Classical cipher / International Obfuscated C Code Contest / Computer programming / Linguistics / Computing

News Stperstarsdescendon Oz in 2013 Z UB ] NI . , I E H TBR A, Y NT E R F E&LJOS H U A B E LLA\4ONGTHOSE

Add to Reading List

Source URL: www.australianworldorchestra.com.au

Language: English - Date: 2015-05-06 04:00:57
106Command shells / Cross-platform software / Source code / Scripting languages / ISPF / Procedural programming languages / IBM Software Configuration and Library Manager / CLIST / REXX / Computing / Computer programming / Software engineering

z/OS V1R11.0 ISPF SCLM Guide and Reference

Add to Reading List

Source URL: publibfp.boulder.ibm.com

Language: English - Date: 2010-04-22 16:41:20
107Command shells / Source code / Cross-platform software / Scripting languages / Technical communication / ISPF / IBM Software Configuration and Library Manager / CLIST / Macro / Computing / Computer programming / Software engineering

z/OS V1R13.0 ISPF SCLM Guide and Reference

Add to Reading List

Source URL: publibfp.boulder.ibm.com

Language: English - Date: 2011-07-12 02:57:56
108Text messaging / Multimedia Messaging Service / SMS / Short code / Premium-rate telephone number / Limited liability company / GSM / Technology / Mobile technology / Wireless

Agreement on cooperation in terms of premium services Eurokoncept Sp. z o.o. with its seat in Kraków, ul. Wielicka 72, [removed]Kraków, registered into the National Court Register run by the Regional th Court for Kraków

Add to Reading List

Source URL: www.dotpay.pl

Language: English - Date: 2014-01-13 05:39:32
109Parallel computing / Plasma physics / Computational physics / Computational fluid dynamics / Fusion power / Plasma / Particle-in-cell / Toroidal and poloidal / Supercomputer / Computing / Physics / Science

Grid -Based Parallel Data Streaming implemented for the Gyrokinetic Toroidal Code S. Klasky1, S. Ethier1, Z. Lin2, K. Martins1, D. McCune1, R. Samtaney1 1 Plasma Physics Laboratory, Princeton University, NJ[removed]USA

Add to Reading List

Source URL: www.sc-conference.org

Language: English - Date: 2003-09-18 17:50:05
110Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-14 20:45:31
UPDATE