• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 16
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Statistical analysis on counterfeit currency

溫達偉, Wan, Tat-wai, David. January 1996 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
2

Song ren yi jing gai jing kao

Ye, Guoliang. January 1900 (has links)
Thesis (M.A.)--Guo li taiwan da xue, 1978. / Reproduced from typescript. Includes bibliographical references (p. 199-208).
3

Die literarischen anfänge James Macphersons

Wetterwald, Franz Herman, January 1918 (has links)
Inaug.-diss.--Basel. / Vita. "Bibliographie": p. [v]-vi.
4

The use and reception of forged documents in fifteenth-century England

Hiatt, Alfred Charles January 1999 (has links)
No description available.
5

A bishop's crozier from the collection of the Arizona State Museum: an essay in its identification

Leavitt, Virginia Couse January 1979 (has links)
No description available.
6

Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia.

Brown, George Maxwell January 2007 (has links)
Title page, contents and abstract only. The complete thesis in print form is available from the University of Adelaide Library. / To investigate the extent of the problem of use of fraudulent academic qualifications in Australia, the study used two approaches under the theoretical framework of risk management. Firstly, the author assessed the potential risk of Australian academic qualifications being falsified and available on the Internet, through an exploratory research question. Secondly, equivalency testing was used to assess how far existing verification tools were being employed by three separate users of academic qualifications in Australia. --p. xix. / http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1289333 / Thesis (Ph.D.) -- University of Adelaide, School of Education, 2007
7

Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia.

Brown, George Maxwell January 2007 (has links)
Title page, contents and abstract only. The complete thesis in print form is available from the University of Adelaide Library. / To investigate the extent of the problem of use of fraudulent academic qualifications in Australia, the study used two approaches under the theoretical framework of risk management. Firstly, the author assessed the potential risk of Australian academic qualifications being falsified and available on the Internet, through an exploratory research question. Secondly, equivalency testing was used to assess how far existing verification tools were being employed by three separate users of academic qualifications in Australia. --p. xix. / http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1289333 / Thesis (Ph.D.) -- University of Adelaide, School of Education, 2007
8

Philosophy of art forgeries: the aesthetic difference between originals and copies.

Negrich, René Catherine 23 December 2011 (has links)
This thesis consists of three chapters and deals with the aesthetic status of forgeries regarding works of literature, the visual arts, and musical works. The first chapter deals with the definition of forgery and I explain the difference between forgeries and mere fakes. I also give examples of famous art forgeries. In the second chapter I explain the leading arguments regarding the aesthetic status of forgeries. These arguments come from Nelson Goodman, Alfred Lessing, Mark Sagoff, Denis Dutton, John Hoaglund, Tomas Kulka, Kendall Walton, and Sherri Irvin. In the final chapter I give my own view and explain what exactly is aesthetically wrong with forgeries. My main issue with forgeries deals with deception and with what this deception entails. / Graduate
9

Μέθοδοι προστασίας ιστοσελίδων στο διαδίκτυο

Μπαλαφούτης, Χρήστος 19 October 2012 (has links)
Στην παρούσα διπλωματική εργασία παρουσιάζονται βασικές έννοιες και μέθοδοι για την ασφάλεια ιστοσελίδων και ιδιαίτερα των site με web application προσανατολισμό, χωρίς αυτό να σημαίνει ότι αρκετές τεχνικές προστασίας και σφάλματα που θα εντοπίσουμε δεν μπορούν να συναντηθούν και σε άλλου σκοπού ιστοσελίδες. Αρχικά, γίνεται αναφορά στο τι είναι μια εφαρμογή ιστού (web app) και ποια είναι τα στοιχεία που την αποτελούν. Στη συνέχεια, χρησιμοποιώντας έρευνες, παρουσιάζονται κάποιες από τις πιο “δημοφιλείς” επιθέσεις που γίνονται σε ιστοσελίδες και περιγράφεται πιο διεξοδικά ποια αδύνατα σημεία της δομής των ιστοσελίδων εκμεταλλεύονται. Παράλληλα, γίνεται αναφορά στο πως και με ποια εργαλεία μπορούμε να εντοπίσουμε και να κλείσουμε τα κενά ασφαλείας που τυχόν έχει μία εφαρμογή ιστού. Τέλος, παρουσιάζεται η εφαρμογή που αναπτύχθηκε στα πλαίσια της εργασίας με σκοπό να γίνει επίδειξη συγκεκριμένων επιθέσεων και σφαλμάτων που παρατηρούνται στο διαδίκτυο. / In the following pages basic principals and methods are presented in order to secure websites and web applications. I begin by mentioning what is a web application. Moreover, by using statistics and recent researches from various sources i mention the most common web app attack methods and which vulnerabilities can be found in a web app and how to prevent exploiting, something we can accomplish by using various penetration testing tools. Finally, by using a basic web app some web attacks are shown so that it will become more clear how these attacks work.
10

Analysis of PAH and PCB Emissions from the Combustion of dRDF and the Nondestructive Analysis of Stamp Adhesives

Poslusny, Matthew 05 1900 (has links)
This work includes two unrelated areas of research. The first portion of this work involved combusting densified refuse derived fuel (dRDF) with coal and studying the effect that Ca(0H)2 binder had on reducing polycyclic aromatic hydrocarbon (PAH) and polychlorinated biphenyl (PCB) emissions. The second area of work was directed at developing nondestructive infrared techniques in order to aid in the analysis of postage stamp adhesives. With Americans generating 150-200 million tons a year of Municipal Solid Waste (MSW) and disposing of nearly ninety percent of it in landfills, it is easy to understand why American landfills are approaching capacity. One alternative to landfilling is to process the MSW into RDF. There are technical and environmental problems associated with RDF. This work provides some answers concerning the amount of PAH and PCB emissions generated via the combustion of RDF with coal. It was found that the Ca(OH)2 binder greatly reduced both the PAH and the PCB emissions. In fact, PAH emissions at the ten-percent level were reduced more by using the binder than by the pollution control equipment. If the Ca(0H)2 binder can reduce not only PAH and PCB emissions, but also other noxious emissions, such as acid gases or dioxin, RDF technology could soon be the answer to the current landfill problems. The second portion of this work focused on developing a method to analyze stamp adhesives nondestructively. Using this method, it was fairly easy to differentiate among the three different types of adhesives that have been used by the United States Postal Service: gum arabic, dextrin, and polyvinyl alcohol. Differences caused by changes in chemicals added to the adhesives were also detected. Also, forgeries were detected with as much success, if not more, than by conventional methods. This work also led to the construction of equipment that allows large samples to be analyzed by reflectance infrared methods.

Page generated in 0.0555 seconds