Malicious software

Adware (3)
Anti-phishing (4)
Anti-spyware (1)
Anti-virus software (1)
Botnet (6)
Exploit (130)
Malicious software (4)
Payload (23)
Phishing (9)
Software virus (3)
Spyware (3)
Trojan (4)

Synopsis: Security: Cybercrime: Malicious software:


(Focus) Eunika Mercier-Laurent-The Innovation Biosphere_ Planet and Brains in the Digital Era-Wiley-ISTE (2015).pdf.txt

and of low speed particularly if high payloads have to be transported. They are far from reaching the performance of biological quadrupeds in natural environments.


(Management for Professionals) Jan vom Brocke, Theresa Schmiedel (eds.)-BPM - Driving Innovation in a Digital World-Springer International Publishing (2015).pdf.txt

and delivery •The virtual business †Virtual business connects the best global competences in virtual networks in order to quickly and effectively exploit more business opportunities and pool its resources of business creation, innovation, distribution,

This is what we would like to exploit systematically. Although the underlying databases are loaded with data, there are no explicit references to events, cases, and activities.

The architecture for the implementation of these concepts exploits the benefits already offered by BPM and builds a new layer on top of that.


2010 OECD SME Entrepreneurship and Innovation Report.pdf.txt

Both public policy makers and firms and research organisations themselves have become increasingly interested to support such commercialisation, seeing spin-offs as one of the key ways to exploit untapped knowledge,


2011 Missing an Open Goal_UK public policy and open innovation.pdf.txt

you may still be in a better position than your competitors to buy it back and exploit it internally;

whether they are primarily looking to bring in innovation (inbound) or externally exploit internal innovation (outbound),

Amazon largely looking to externally exploit internal innovations for direct commercial gain. 17 Missing an open goal?


2012 Flanders DC Open Innovation in SMEs.pdf.txt

White space represents the business opportunities outside a company†s current businesses that require a different business model to exploit.


2012 InterTrade Ireland Innovation Ecosystem Report.pdf.txt

and resources needed to successfully exploit new insights that they have on their market. In opening their innovation processes

on the one hand, for different, better or cheaper products and services and, on the other hand, to mobilise or exploit the opportunities and capacities within their value chains.


2014 Irish Government National Policy Statement on Entrepreneurship in Ireland.pdf.txt

Local Enterprise Offices and à daras na Gaeltachta to exploit fully the enterprise assets of their community and foster new thinking in the enterprise area Each LEO will develop a Local Enterprise

and connectivity to help the network†s members exploit opportunities. EI will roll out online networks to other client groups in coming months.


2014_global_rd_funding_forecast.pdf.txt

R&d efforts will evolve to develop payload and sensor platform technologies for a wide array of new applications.


2015-April-Social_Innovation_in_Europe.pdf.txt

Social innovation often recognises, exploits and coordinates assets and resources which would otherwise be wasted, under-used

define, and exploit opportunities in order to enhance social wealth by creating new ventures or managing existing organizations in an innovative manner†(p. 522).


A Hitchiker 's Guide to Digital Social Innovation.pdf.txt

and their capacity to exploit'network effects'to scale up or join forces and multiply the potential of grass-root initiatives across social networks.


Basedoc.scn

G#2v 12484 Malicious software G#3v 12485 Adware 0#4#adware Adware G#3v 12486 Anti-phishing

0#4#anti-phishing Anti-phishing G#3v 12487 Anti-spyware 0#4#anti spyware Anti-spyware G#3v 12488 Anti-virus software

0#4#anti virus software Anti-virus software G#3v 12489 Botnet 0#4#botnet Botnet G#3v 12490 Exploit

0#4#exploit Exploit G#3v 12491 Malicious software 0#4#malicious software Malicious software G#3v 12492 Payload

G#4v 12493 Keylogger 0#5#keylogger Keylogger G#4v 12494 Payload 0#5#payload Payload

G#4v 12495 Rootkit 0#5#rootkit Rootkit G#3v 12496 Phishing 0#4#phishing Phishing

G#3v 12497 Software virus 0#4#software virus Software virus G#3v 12498 Spyware 0#4#spyware Spyware

G#3v 12499 Trojan 0#4#trojan Trojan 0#4#trojan horse Trojan G#2v 12500 Phreaking

0#3#phreaking Phreaking G#1v 12501 Decryption 0#2#decryption Decryption G#1v 12502 Emergency

0#2#emergency Emergency G#1v 12503 Encryption G#2v 12504 Advanced encryption standard 0#3#advanced encryption standard Advanced encryption standard

G#2v 12505 Encryption 0#3#encryption Encryption G#1v 12672 Eye vein verification 0#2#eye vein verification Eye vein verification

G#1v 12506 Fire control system 0#2#fire control system Fire control system G#1v 12507 Fraud deterrence 0#2#fraud deterrence Fraud deterrence

G#1v 12533 Guard G#2v 12534 Bodyguard 0#3#bodyguard Bodyguard G#2v 12535 Border guard

0#3#border guard Border guard G#2v 12536 Coast guard 0#3#coast guard Coast guard 0#3#coastguard Coast guard

G#2v 12537 Guard 0#3#guard Guard G#2v 12538 National guard 0#3#national guard National guard

G#2v 12539 Patrol 0#3#patrol Patrol G#2v 12540 Security guard 0#3#security guard Security guard

G#2v 12541 Watchman 0#3#night watchman Watchman 0#3#watchman Watchman G#1v 12508 Insecurity

0#2#insecurity Insecurity G#1v 12509 Insurgency 0#2#insurgency Insurgency G#1v 12673 ismartalarm

0#2#ismartalarm ismartalarm G#1v 12542 IT SECURITY G#2v 12543 Application security G#3v 12544 Antispyware software

0#4#antispyware Antispyware software 0#4#antispyware software Antispyware software G#3v 12545 Antivirus software G#4v 12546 Antivirus software

0#5#anti virus Antivirus software 0#5#antimalware Antivirus software 0#5#antimalware software Antivirus software 0#5#antivirus Antivirus software

0#5#antivirus software Antivirus software G#4v 12547 Bitdefender 0#5#bitdefender Bitdefender G#4v 12548 Kaspersky

0#5#kaspersky Kaspersky G#3v 12549 Application security 0#4#application security Application security 0#4#software security Application security

G#2v 12550 Computer security 0#3#computer security Computer security 0#3#cyber security Computer security 0#3#cybersecurity Computer security

0#3#it security Computer security G#2v 12551 Data security 0#3#data security Data security G#2v 12552 Information security

0#3#information security Information security 0#3#infosecurity Information security G#2v 12553 Internet security G#3v 12554 Browser security

0#4#browser security Browser security G#3v 12555 Electronic mail security 0#4#electronic mail security Electronic mail security G#3v 12556 Internet protocol security

0#4#internet protocol security Internet protocol security G#3v 12557 Internet security 0#4#internet security Internet security G#3v 12558 Mysecurecyberspace

0#4#mysecurecyberspace Mysecurecyberspace G#3v 12559 Password security 0#4#password security Password security G#3v 12560 Security token


Case study analysis report of online collaboration and networing tools for Social Innovation.pdf.txt

competitors might exploit •The difficulties of setting appropriate commercial prices for the product and services which the public sector


Conference_Documentation_Museums in the Digital Age.pdf.txt

digitisation, dissemination and further exploit -ation of this content in the digital environment will be prominent.

museum sector that exploits its potential to further a broader social agenda, that makes its


Deloitte_Europe's vision and action plan to foster digital entrepeneurship.pdf.txt

respect, the European commission took action to help entrepreneurs and SMES to fully exploit the potential of those technologies, both in terms of supply of new digital products and services


Developing National eHealth Interoperability Standards for Ireland - a consultation Document - HIQA 2011.pdf.txt

may be difficult to exploit services-oriented architecture ï¿no terminology support ï¿does not support semantic


Digital Agenda 2014-2017 - Germany.pdf.txt

further exploit the opportunities presented in the areas of Industry 4. 0, 3d, smart services, big data and cloud com


Digital Opportunities_ Innovative ICT solutions for youth employment.pdf.txt

can be a double-edged sword. â€oemany businesses in developing countries are started not to exploit Digital opportunities:

dynamic and willing to take risks to exploit existing business opportunities and create new ones.


DIGITAL SOCIAL INNOVATION A Hitchiker 's Guide to Digital Social Innovation.pdf.txt

their capacity to exploit'network effects'to scale up or join forces and multiply the potential of grass-root initiatives across social networks.


DIGITAL SOCIAL INNOVATION Growning a Digital Social Innovation Ecosystem for Europe.pdf.txt

There is great potential to exploit digital network effects, in social innovation activity and new services that generate social value,


DIGITAL SOCIAL INNOVATION social_innovation_decade_of_changes.pdf.txt

-ly exploit the benefits that an economy can generate. Mutual societies, cooperatives third-sector organisations in general and social business are an integral part of this wid


dsi-report-complete-EU.pdf.txt

 There is great potential to exploit digital network effects both in social innovation activity and in new services and approaches that generate social value.

-cal mass of users and exploit the network effect Digital social innovation plays a central role in the development of the Future Internet.

There is great potential to exploit digital network effects both in social innovation activity and in new ser

digital social innovations that enable new types of collaborations and exploit the network effect. By using

The proposed approach to mapping and visualisation exploits the flexibility of linked data. All data points will have their own URIS that will allow mapping to Open Street Map objects.

exploit Facebook, finding that it is one of the best ways to attract people to electronic democracy both via sharing and Facebook advertisements

infrastructures that exploit locality, react to environmental changes and rely on cross-layer optimizations Regulation can also be a barrier,

willing to hack into machines, they†re willing to run botnets. †In a recent


dsi-report-complete-lr.pdf.txt

 There is great potential to exploit digital network effects both in social innovation activity and in new services and approaches that generate social value.

-cal mass of users and exploit the network effect Digital social innovation plays a central role in the development of the Future Internet.

There is great potential to exploit digital network effects both in social innovation activity and in new ser

digital social innovations that enable new types of collaborations and exploit the network effect. By using

The proposed approach to mapping and visualisation exploits the flexibility of linked data. All data points will have their own URIS that will allow mapping to Open Street Map objects.

exploit Facebook, finding that it is one of the best ways to attract people to electronic democracy both via sharing and Facebook advertisements

infrastructures that exploit locality, react to environmental changes and rely on cross-layer optimizations Regulation can also be a barrier,

willing to hack into machines, they†re willing to run botnets. †In a recent


EC_ European Smartgrids Technology Platform _2006.pdf.txt

This will have the potential to exploit fully the use of both large, transmission connected generators and smaller distributed power sources


eco-innovate-sme-guide.pdf.txt

strengths of your product that you can exploit in promotion Communications incorporating understand-†¢able, valid and clear environmental perform


E-commerce Action plan 2012-2015.pdf.txt

as'botnets')to carry out attacks against information systems. The Council and the European parliament reached a political agreement on a compromise text in early


Economist Intelligence Unit_Reaping the benefits of ICT_2004.pdf.txt

new challenges and exploit technology†s potential to the full 3. Redouble the assault on barriers to competition


Entrepneurial Orientation and Network Ties_ innovative performance of SMEs in an emerging-economy manufacturing cluster.pdf.txt

prepared to meet future challenges and exploit future opportunities, and therefore may engage actively in search of new ideas outside of their cluster


Entrrepreneurial and Innovative Behaviour in Spanish SMEs_ essays on .pdf.txt

of information by a firm or its employees but also to the organization†s ability to exploit

exploit knowledge Rogers (2004) ACAP; economic growth A model to examine the importance of technological

exploit entrepreneurial opportunities (Lumpkin and Dess, 1996. Essentially, it refers to a firm†s strategy orientation, capturing the specific entrepreneurial aspect of decision


European Competitiveness in Key Enabling Technology_2010.pdf.txt

exploit the innovative potential and competences by transferring ideas and research output from the scientific community into commercial applications and products.


Forfas_South_East_Action_Plan_Publication.pdf.txt

There is potential to exploit new areas, such as Silver-technologies, building on the existing strengths in ICT and

engineering, and leverage regional assets such as Waterford Port, to exploit opportunities in renewable energy supply chains.

There is potential to exploit new areas, such as Silver-technologies, building on the existing strengths in ICT and


Fueling innovation through information technology in smes.pdf.txt

exploit newer technologies than their larger, less agile competitors (Xiang and Lan 2001; Bonk 1996


Growing a digital social innovation ecosystem for Europe.pdf.txt

There is great potential to exploit digital network effects, in social innovation activity and new services that generate social value,


Guide to Research and Innovation Strategies for Smart Specialisations.pdf.txt

The key to successful differentiation is to exploit related variety, suggesting that a regional economy can build its competitive advantage by

6. 3 Does the strategy include a clear reflection/proposal on how to exploit synergies between different European, national and regional funding sources, in


ICT and e-Business Impact in the Transport and Logistics Services Industry.pdf.txt

skills and resources which are needed to exploit technological innovation and to support the reorganisation of work processes.


ICT for Societal Challenges.pdf.txt

Ranging in style from large-scale worms to phishing attempts, cyber attacks have evolved to unprecedented levels of sophistication.

Moreover, there are plans to exploit DEMONS technologies after the conclusion of the project in actual operational networks


ICT' Role in Healthcare Transformation 2009.pdf.txt

environment, Ireland has a tremendous opportunity to exploit multiple opportunities in these international markets. Our enhanced reputation will


industry_innovation_competitiveness_agenda.pdf.txt

Small businesses have the advantage of being adaptable and flexible, able to exploit niche markets, develop


innomeld_kortv_eng.pdf.txt

and productivity. this is not least due to our capacity to exploit scarce resources, among other ways, by means of new technological and organisational developments based on


InnoSupport - Supporting Innovation in SMEs.pdf.txt

and excellent ideas that could exploit new technolo -gies or products are very important for the development of business.

if production exploits resources and people in a not acceptable way. The internet and mass media are able to influence on costumers opinions during very short timeâ€


INNOVATION AND SMEs PRODUCTS AND SERVICES.pdf.txt

technology/market/product combinations that exploit new technology than they are at conducting fundamental research (which large firms do better.

exploit the financial potential that such businesses offer. Nearly all product manufacturing companies that invest heavily in extending their service businesses increase their service


Innovation capacity of SMEs.pdf.txt

Innovative capabilities for SMES depend on both their ability to exploit external knowledge and on their


Innovation driven growth in Regions The role of Smart specialisation.pdf.txt

especially MNES, will exploit differently the same set of national or regional comparative advantages Among the conditions that affect factor endowments, specialisation and comparative advantage are the following

overlaps, and limit the possibilities in some activities to exploit economies of scale, but it also does not


Innovation in SMEs - A review of its role to organisational performance and SMEs operations sustainability.pdf.txt

vision, enthusiasm, future-oriented exploit external opportunities for inward investment and information gathering. In addition, Motwaniet al.


Innovation, collaboration and SMEs internal research capacities.pdf.txt

and exploit networks information differently 2. Industrial co-operation: from exchange to production From a theoretical point of view, the notion of net

-tive capabilities depend on the ability to exploit exter -nal knowledge and on in-house R&d efforts.


Innovation, Performance and Growth Intentions in SMEs.pdf.txt

for the proposition that national culture influences the way firms†exploit entrepreneurial orientation has been noted by Knight


MIS2014_without_Annex_4.pdf.txt

organize and take urgent action to exploit the possibilities and harness the challenges effectively†(UNSC, 2014). 30 In view of declining

consumer confidence and hinder efforts to exploit big data for the greater social good. Encryption virtual private networks (VPNS), firewalls, threat


NESTA Digital Social Innovation report.pdf.txt

There is great potential to exploit digital network effects, in social innovation activity and new services that generate social value,


NHS Prescription Services - the impace of legacy ICT - National Audit Office UK 2013.pdf.txt

changes in its business environment and/or exploit new technologies Business case and funding Business case (s) for replacement reflect good


Online services, including e-commerce, in the Single Market.pdf.txt

pharmaceutical offers, fake banking services (phishing), data protection infringements, illicit tobacco or alcohol advertisements, unfair commercial practices or breaches of the EU

where there is a financial gain involved in the takedown (for instance phishing websites. A majority of the respondents to the consultation proposed a European notice-and-takedown

is much longer than the time before takedown of phishing sites d) Liability for providing wrongful notices or for taking down or blocking legal content


Open Innovation - The Good, The Bad, The Uncertainties - Eliza Laura Coras.pdf.txt

exploit technology, knowledge gaps and financial constraints. The extensive literature written on open innovation subjects highlights the motives,

to effectively exploit diversity and to share risk. Innovation collaboration allows organization to gain needed skills, technologies, assets,


Open Innovation 2.0.pdf.txt

exploit knowledge is often crucial for its survival in the long run. One way of doing this is to recruit per

-lying limited ability to better exploit knowledge assets in Europe. The present chapter deals with

exploit the potential network effects, different types of platform strategies are being used in terms of openness, compatibility, control (8). In this context

innovation, innovators generate ideas by exploit -ing existing or new data sources and analytics to


Open innovation in small and micro enterprises .pdf.txt

situations for all parties involved and how to exploit external knowledge sources effectively Despite the insights generated,


Open innovation in SMEs - Prof. Wim Vanhaverbeke.pdf.txt

different business model to exploit. Each in their own way, many other management authors have suggested methods and models to implement business models and business model innovations


Open innovation in SMEs Trends- motives and management challenges .pdf.txt

'open innovation',firms use both internal and external pathways to exploit technologies and, concurrently, they scout different external sources of technology


Open-innovation-in-SMEs.pdf.txt

different business model to exploit. Each in their own way, many other management authors have suggested methods and models to implement business models and business model innovations


Oxford_ European competitiveness in information technology and lon term scientific performance_2011.pdf.txt

†exploits and addresses exponential growth †seeks the fundamental limits on what can be


Policies in support of high growth innovative smes.pdf.txt

and growth in catch up countries makes much more use of strategies that exploit com -parative advantages†(p. 6) and are oriented towards export markets.


Policies in support of high-growth innovative SMEs - EU - Stefan Lilischkis.pdf.txt

and growth in catch up countries makes much more use of strategies that exploit com -parative advantages†(p. 6) and are oriented towards export markets.


Regional Planning Guidelines_SouthEastIreland.pdf.txt

-imised, offering alternative uses for land withdrawn from agriculture and to commercially exploit existing forest


RIS3_Canary Islands.pdf.txt

ï Why we in the Canary islands miss opportunities to exploit for a knowledge-based economy, the availability of good


RIS3_GUIDE_FINAL.pdf.txt

The key to successful differentiation is to exploit related variety, suggesting that a regional economy can build its competitive advantage by


Romania Western Regiona Competitiveness Enhancement and Smart Specialization - Report.pdf.txt

exploit comparative advantages of other parts of the country. Moreover, when they venture outside the


SEFEP-SmartGrids_EU_2012.pdf.txt

 exploit  active  demand  in  CIRED  Ed  21st  International


SMART SPECIALISATION STRATEGY, ASTURIAS.pdf.txt

ï There is no evidence that the strategy includes a clear reflection/proposal on how to exploit


SMEs inventive performance and profitability in the markets for technology.pdf.txt

whether small ï rms are better off exploit -ing their comparative advantage in inventing by becoming â€oetech

small ï rms may be less able to exploit economies of scale and scope, or be more ï nancially constrained (e g


SMEs, Entrepreneurship and Innovation.pdf.txt

as one of the key ways to exploit untapped knowledge, alongside the more traditional patent and licensing routes and the publishing and teaching activities of universities.

exploit new products and services, and higher education institutions can play an important supporting function through the transfer of knowledge.

Second, these resource combinations are intended primarily to explore and exploit opportunities to create social value by stimulating social change

and exploit opportunities in order to enhance social wealth by creating new ventures or managing existing organisations in an innovative manner. †(p. 118


Southeast-economic-development-strategy.docx.txt

To explore the feasibility of the deepening of the Port of Waterford and exploit its commercial potential as a load-on load-off Port

and level of expertise in the logistics industry can be built upon to create further business opportunities and exploit emerging trends.

To explore the feasibility of the deepening of the Port of Waterford and exploit its commercial potential as a load on load off Port


Tepsie_A-guide_for_researchers_06.01.15_WEB.pdf.txt

ways to exploit investment models through more effective mechanisms of reducing investment capital costs †which are the main barrier for this form of

need the management and business skills to exploit market opportunities to set up and grow a social


The future internet.pdf.txt

supporting context-aware communications that efficiently exploit the available net -work resources. Furthermore, context-aware networking enables new types of appli

using mechanisms that exploit the business requirements, other forms of context and context usage statistics.

towards closed-loop algorithms and procedures which are able to properly exploit appropriate real-time network measurements.

Payload Size Control equal to 84 Bytes; and; Delivery Guarantee re -quest. In this context, this need is informed, to the Service Layer, by the direct

resources, exploit the native self-organizing incentive-based mechanisms of over -lays to increase the level of traffic locality within ISPS

because signalling in the payload is more likely to get traumatised by some middleboxes â € There is a separate connection-level sequence number, in addition to the stan

TCP-Options for signalling (rather than the payload) is that it should simplify off -loading by network cards that support MPTCP, due to the separate handling of

addressing one of the major obstacles preventing businesses and users to fully exploit the Future Internet opportunities today

that is used for the payload communication. The data-centric paradigm is a natural match with the communication of topology information that needs to be distributed

-tial latency for the payload communication as popular operations can be completed locally based on cached data

A graphlet defines the network resources used for the payload communication and it can be anything from the path of an IP packet to private virtual circuits.

payload communication. A graphlet adheres to a set of scopes that are responsible for policy-compliant matching of nodes to interaction instances, collecting the needed

on a per-segment basis in the payload communication, we use packet level authentica -tion (PLA) 25 that uses elliptic curve cryptography (ECC) 23.

delivery tree) that can then be used for the fast-path payload communication At every level of the hierarchy, the rendezvous core provides an anycast routing to the

ensure that no security hole arises from implementations that exploit the com -putational infrastructure of the Future Internet.

-port for the discovery of important vulnerabilities and associated exploits that are already plaguing complex web-based security-sensitive applications, and thus

on Proverif 7, exploits abstract interpretation for veriï cation of web services that use SOAP messaging, using logical predicates to relate the concrete SOAP

approaches that exploit extend or redesign current Internet architecture and protocols The Pan-European laboratory 1, Panlab, is a FIRE 2 initiative and builds on a fed

Application Payload Classif Content aware flow classification SM@SP MANE CANMGR@AS1 Intranrm@AS1 3. MANE configuration for CAN

-mon cryptographic techniques over the packets†payload. Private communications is to be adopted when the confidentiality and authenticity of the entire packets, includ

In order to exploit the opportunities of services enabled by the Future Internet for smart cities, there is a


The Relationship between innovation, knowledge, performance in family and non-family firms_ an analysis of SMEs.pdf.txt

willingness to adjust their business as necessary in order to exploit them. The pro -active nature of firms to utilize opportunities was measured by action and decision


TOWARDS TOWARDS A NETWORK NETWORK OF DIGITAL BUSINESS ECOSYSTEMS_2002.pdf.txt

organizations, is required a further stage in ICT technology adoption which exploits the dynamic interaction (with cooperation and competition) of several players in order to


Vincenzo Morabito (auth.)-Trends and Challenges in Digital Business Innovation-Springer International Publishing (2014) (1).pdf.txt

4 Mapreduce exploit, on the one hand, (i) a map function, specified by the user to process a key

electric utilities, hospitals to exploit GE€ s Big data expertise, generating big savings, likewise. Thus, human resources and talent management are key issues to

•Exploit any internal skills already acquired on a particular technology suitable to be adopted for the mobile applications development on the chosen device (s

Crime††9, p. 4. For example, the revenue of a phishing advertised by email spam is the sum of the money withdrawn from the accounts of the subject that is

victim of the phishing activity •Direct losses are ††the monetary equivalent of losses, damage, or other suffering

would be far more effective than telling the public to fit an anti-phishing toolbar or purchase antivirus software††10, p. 1. Thus, a conclusion from the study is that

implement a business model able to deal with and exploit such characteristics of the digital economy Table 9. 7 compares the essential features of the processes of transformation of

models that are most popular among Web 2. 0 companies, which exploits the peculiarities of the information economy, is the so-called ††freemium††(combi


WEF_EuropeCompetitiveness_FosteringInnovationDrivenEntrepreneurship_Report_2014.pdf.txt

Develop collaboration and exploit results •Set and manage clear expectations •Focus on tangible results


WEF_GlobalCompetitivenessReport_2014-15.pdf.txt

markets allow firms to exploit economies of scale Traditionally, the markets available to firms have been constrained by national borders.


WEF_GlobalInformationTechnology_Report_2014.pdf.txt

fully exploit big data expansion (Figureâ 3). An approach that tackles these issues concurrently will help to

ability to exploit big data opportunities or exposing them to threats of legal and regulatory intervention

is because any single exploit is likely to gain access to only a limited part of the whole database.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011