منابع مشابه
crime of child abuse from the viewpoint of the islamic penal code and twelver shiite jurisprudence
when a crime occurs in society, albeit small, first it endangers the society and creates chaos in the society; in the second place, it make people feel pity for who was assaulted. if the victims are children of the community, we expect it to take action very quickly. this research is not about juvenile delinquency and not to criminalize children but to scrutinize how the crimes are performed ag...
متن کاملA Code-Based Approach to Unauthorized Access Under the Computer Fraud Abuse Act
Thirty years ago, Congress passed the Computer Fraud and Abuse Act ("CFAA ") to combat the emerging problem of computer crime. The statute's core prohibitions targeted one who "accesses" a computer "without authorization" or who "exceeds authorized access." Over time, the incremental statutory changes and large-scale technological changes have dramatically expanded the potential scope of the CF...
متن کاملIssued for Abuse: Measuring the Underground Trade in Code Signing Certificate
Recent measurements of the Windows code-signing certificate ecosystem have highlighted various forms of abuse that allow malware authors to produce malicious code carrying valid digital signatures. However, the underground trade that allows miscreants to acquire such certificates is not well understood. In this paper, we illuminate two aspects of this trade. First, we investigate 4 leading vend...
متن کاملAlcohol Abuse and Oral Cancer
Background: Various medical, psychiatric and social problems affecting alcohol abuser tend to overshadow their oral health. From an epidemiologic viewpoint, chronic consumption of alcoholic beverages is associated with an increased risk for the upper gastrointestinal tract cancer, and tobacco and alcohol are regarded as the major risk factors for oral cancer. The objective of this presentation ...
متن کاملCode Obfuscation using Code Splitting with Self-modifying Code
Code Obfuscation is a protection technique that transforms the software into a semantically equivalent one which is strenuous to reverse engineer. As a part of software protection and security, code obfuscation got commercial interest from both vendors’ side to keep their proprietary as secret and customers’ side to have a trusted software that don’t leek or destroy their personal information. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Queue
سال: 2012
ISSN: 1542-7730,1542-7749
DOI: 10.1145/2405116.2407417