Wood P.,Base Technologies
IET Seminar Digest | Year: 2015
Presents a collection of slides covering the following topics: advanced attack; threat analysis; remote information gathering; on-site reconnaissance; spear phishing plan; spear phishing exercise; branch office attack plan; branch office attack exercise; head office attack plan; head office attack exercise. Source
Base Technologies | Date: 2009-06-16
Computer programs for examining and modifying data in applicants proprietary database, and for the analysis and repair of corrupted or broken files in applicants proprietary database.
Base Technologies | Date: 2009-01-20
Computer software development tools; Computer software for application and database integration; Computer software for computer system and application development, deployment and management; Computer software that provides web-based access to applications and services through a web operating system or portal interface.
Base Technologies | Date: 2009-01-27
Computer software for application and database integration; Computer software for providing a programming interface to a database.
Base Technologies | Date: 2010-07-27
Resilient hard surface covering for floors, walls and other surfaces.