and Security Technologies

Results: 1110



#Item
731Technology / Energy policy / Sustainable energy / Energy industry / Energy security / Prospective Outlook on Long-term Energy Systems / Energy economics / Energy / Energy development

CanESS: A Powerful Tool for Energy System Analysis Whatif? Technologies User Meeting. Ottawa, February 16, 2012 David B. Layzell, Ph.D., FRSC, Professor and Executive Director France Goulet, Program Development Director

Add to Reading List

Source URL: www.whatiftechnologies.com

Language: English - Date: 2012-02-22 09:12:28
732Management / Security / Information technology / Risk analysis / Supply chain risk management / Supply chain / Risk management / Information and communication technologies in education / Information security / Business / Technology / Supply chain management

ICT Supply Chain Risk Management Workshop - FINAL Agenda

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-10-25 14:08:14
733Biotechnology / Emerging technologies / Agronomy / Genetically modified plant / Plant breeding / Genetically modified organism / Agriculture / Bacillus thuringiensis / Food security / Biology / Molecular biology / Genetic engineering

United Nations Educational, Scientific and Cultural Organization Organisation des Nations Unies pour l’éducation, la science et la culture International Bioethics Committee (IBC) Comité international

Add to Reading List

Source URL: www.unescobkk.org

Language: English - Date: 2008-11-20 05:13:28
734Cyber-security regulation / Symantec / United States House Homeland Security Subcommittee on Cybersecurity /  Infrastructure Protection /  and Security Technologies / United States House Homeland Security Subcommittee on Transportation Security / Cyberwarfare / Michael McCaul / Yvette Clarke

July 28, 2014 The Honorable Michael T. McCaul Chairman Committee on Homeland Security

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2014-08-11 10:16:48
735ISPRS / Earth observation / Geographic information system / Disaster / Emergency management / Planetary science / Earth / Global Monitoring for Environment and Security / Science / Remote sensing / Global Earth Observation System of Systems / Group on Earth Observations

Microsoft Word - IP 3 - ALTAN Geospatial Technologies& MDGs.doc

Add to Reading List

Source URL: unstats.un.org

Language: English - Date: 2010-12-16 11:28:39
736Computer security / Computing / DomainKeys Identified Mail / DMARC / Sender Policy Framework / Sender ID / Phishing / DomainKeys / Vouch by Reference / Email authentication / Spam filtering / Email

Technical Brief SPF, DKIM, and DMARC Demystified The what, why, and how of email sender identity technologies Enterprise sender identity technologies—SPF, DKIM, and DMARC—when properly

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:18
737Password / Cryptographic software / BlackBerry / Password strength / Random password generator / Software / Security / Cryptography

FAQ –BlackBerry Passwords Q: Why is the Department of Information and Communications Technologies implementing passwords on Marine Institute Blackberries? A:

Add to Reading List

Source URL: www.mi.mun.ca

Language: English - Date: 2014-06-06 12:24:02
738Signals intelligence / Unmanned aerial vehicle / National security / Association for Unmanned Vehicle Systems International / Privacy / Internet privacy / National Conference of State Legislatures / Surveillance / Fourth Amendment to the United States Constitution / Ethics / Security / Military terminology

UAS Privacy Considerations Unmanned Aircraft Systems (UAS) are emerging technologies that have the potential to transform America by providing wide ranging economic, environmental, safety, and security benefits. A recent

Add to Reading List

Source URL: aerostates.org

Language: English - Date: 2014-04-10 15:08:22
739Data security / Role-based access control / PERMIS / Role hierarchy / Separation of duties / Information security / Principle of least privilege / Authorization / Operating system / Security / Computer security / Access control

SACMAT 2001: 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, USA, ACM. The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad

Add to Reading List

Source URL: moffett.me.uk

Language: English - Date: 2006-04-24 07:57:07
740Security / Library science / Information / Copyright / Information security / Digital rights management / InterTrust Technologies / Data

Statement To US Copyright Office Regarding Distance Education And Fair Use February 5, 1999 Submitted by:

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2004-03-23 16:42:23
UPDATE