Search for: "Authentic Designs "
Results 1881 - 1900
of 2,913
Sort by Relevance
|
Sort by Date
12 Jan 2015, 3:45 am
" Indeed, the problem of authenticity has been raised by some commentators who have argued that, because of copyright constraints, historical accuracy has been negatively affected.But is this all copyright's fault? [read post]
9 Jan 2015, 11:22 am
They usually duplicate the logo, design, style of writing, and even signatures of a reputed establishment to deceive people into thinking them legitimate. [read post]
9 Jan 2015, 11:22 am
They usually duplicate the logo, design, style of writing, and even signatures of a reputed establishment to deceive people into thinking them legitimate. [read post]
9 Jan 2015, 8:31 am
Enhanced licensing techniques that authenticate clients for software programs are disclosed and protected by U.S. [read post]
5 Jan 2015, 7:26 am
” In order to design the organisation’s security network effectively to minimise these risks, the ‘BYOD Guidance: Device Security Consideration’ document recommends that organisations consider authentication and protection for data in transit and for data at rest. [read post]
24 Dec 2014, 4:50 am
For buttons that were removed from authentic designer clothing. [read post]
22 Dec 2014, 10:00 am
However, that perception undervalues the strength of security programs that are designed to meet the reasonableness requirement. [read post]
22 Dec 2014, 4:00 am
What the librarians have done on your behalf is search, identify and authenticate relevant websites, books, journals. [read post]
19 Dec 2014, 2:10 pm
"This worm uses a brute force authentication attack to propagate via Windows SMB shares," Friday's advisory stated. [read post]
12 Dec 2014, 7:34 am
The angry monkey patch is a small part of this vision, helping to create “an authentic universe of morale patches, like those available in the real world. [read post]
10 Dec 2014, 4:56 am
Strategic Information Professionals are the most important pre-requisite in designing a digital library strategy. [read post]
9 Dec 2014, 6:29 pm
Nonetheless, the competent authorities of any Contracting Party may, if necessary, satisfy themselves as to the authenticity of the signature of the authorized person. [read post]
9 Dec 2014, 6:29 pm
Nonetheless, the competent authorities of any Contracting Party may, if necessary, satisfy themselves as to the authenticity of the signature of the authorized person. [read post]
9 Dec 2014, 3:50 pm
Nonetheless, the competent authorities of any Contracting Party may, if necessary, satisfy themselves as to the authenticity of the signature of the authorized person. [read post]
4 Dec 2014, 11:09 am
This callout is typically displayed on top of the source document, showing it (for authentication) but making it difficult to view (controlling focus). [read post]
4 Dec 2014, 8:09 am
--Elements of Law 3.0: On the Relevance of a First Year Law Course Designed to Frame the Law School Curriculum). [read post]
29 Nov 2014, 3:53 am
Mr McKenzie then began working for a rival.In December 2012, Mackenzie Hall obtained an interim interdict from a court which was designed to stop him from working for the new company but Mr McKenzie ignored the order. [read post]
25 Nov 2014, 5:37 am
Sept. 5, 2014), the court addressed eligibility of a patent covering software for designing sheet metal forming tools. [read post]
21 Nov 2014, 8:49 am
Value of design. [read post]
19 Nov 2014, 12:32 pm
What's Happening With Authentication and IndemnificationLunch (Provided) and Keynote AddressPanel 4: Matter of Flamenbaum and the Recovery of Antiquities -- News from the NY Court of AppealsPanel 5: Are Museums Researching Their Collections? [read post]