Entity

Time filter

Source Type


Wood P.,Base Technologies
IET Seminar Digest | Year: 2015

Presents a collection of slides covering the following topics: advanced attack; threat analysis; remote information gathering; on-site reconnaissance; spear phishing plan; spear phishing exercise; branch office attack plan; branch office attack exercise; head office attack plan; head office attack exercise. Source


Trademark
Base Technologies | Date: 2009-06-16

Computer programs for examining and modifying data in applicants proprietary database, and for the analysis and repair of corrupted or broken files in applicants proprietary database.


Trademark
Base Technologies | Date: 2009-01-20

Computer software development tools; Computer software for application and database integration; Computer software for computer system and application development, deployment and management; Computer software that provides web-based access to applications and services through a web operating system or portal interface.


Trademark
Base Technologies | Date: 2009-01-27

Computer software for application and database integration; Computer software for providing a programming interface to a database.


Trademark
Base Technologies | Date: 2010-07-27

Resilient hard surface covering for floors, walls and other surfaces.

Discover hidden collaborations