and the Internet

Results: 43344



#Item
521Behavior / Abuse / Human behavior / Cybercrime / Communication / Child abuse / Persecution / Internet Matters / Social networking service / Cyberbullying / National Society for the Prevention of Cruelty to Children / ChildLine

Webinar: Keeping children and young people safer online (28 JanuaryAttendee Questions Can you recommend any other services to help organisations safeguard

Add to Reading List

Source URL: thecpsu.org.uk

Language: English - Date: 2015-02-06 06:45:16
522NetOps / Military communications / Computing / LandWarNet / Voice over IP / Netcom / Interoperability / Contemporary history / Technology

Voice over Internet Protocol (VOIP) Management Voice over Internet Protocol (VOIP) Management configures and manages Commercial-off-the-Shelf -based Voice over Internet Protocol infrastructure (call processor/controller

Add to Reading List

Source URL: netcom.army.mil

Language: English - Date: 2009-10-26 18:31:58
523Computing / Internet / Network architecture / Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / Units of information / IPsec / Padding / Transport Layer Security / IPv4

Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English
524Privacy / Identity management / Privacy Office of the U.S. Department of Homeland Security / United States Department of Homeland Security / Business / Economy / Internet privacy / Privacy Impact Assessment / Chief privacy officer / Personally identifiable information / Management / Medical privacy

UNITED STATES DEPARTMENT OF COMMERCE Chief Financial Officer and Assistant Secretary for Administration Washington, D.CNOV

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-09-25 15:57:53
525Computing / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Security awareness / Data center / Internet

Computer and Network Security Original Implementation: January 24, 1995 Last Revision: November 2, 2015 This policy establishes the conditions and security requirements for the use of computing equipment and networks at

Add to Reading List

Source URL: www.sfasu.edu

Language: English - Date: 2016-07-26 16:47:37
526Technology / Education / Security / New media / Distance education / Educational psychology / Educational technology / Information technology / Computer security / Internet

Pathways AcademyTechnology Use Agreement Pathways Academy Charter School recognizes the evolving impact of technology on education supports the appropriate use of the Pathways Academy network and the Internet

Add to Reading List

Source URL: www.pathwaysacademy.org

Language: English
527Broadband / Mobile telecommunications / Technology / Academia / 5G / Technology forecasting / Economics / Internet of things / Smart city / Internet access / National Telecommunications and Information Administration / National broadband plan

A new digital Union I What’s in it for citizens with IoT and 5G Imagine a new digital Union Imagine billions of people and devices connected to powerful broadband networks. Imagine the opportunities unlocked by the int

Add to Reading List

Source URL: www.etno.eu

Language: English - Date: 2016-05-24 18:00:00
528Economy / Economy of the European Union / European Insurance and Occupational Pensions Authority / European Union / E-commerce / Insurance / Consumer protection / Online shopping / Marketing / Distribution / Consumer

EIOPA-BoS2016 Feedback statement on EIOPA’s Opinion on sales via the Internet Technological innovation is changing the way business is done, including insurance.

Add to Reading List

Source URL: eiopa.europa.eu

Language: English - Date: 2016-04-04 09:38:08
529Contract law / Law / Private law / Economy / Indemnity / Terms of service / Privacy / Trademark / Medical privacy / Contract / Internet privacy / Warranty

TERMS OF USE Hello & welcome, ticket purchasers! The following Terms of Use govern the use of this site, www.ticketbiscuit.com, www.tututix.com, www.whistletix.com, and www.statechamps.com, and mobile versions thereof (t

Add to Reading List

Source URL: d11vouvjkh42or.cloudfront.net

Language: English - Date: 2016-08-08 15:35:45
530Business / Economy / Groupware / Computing / Computer networks / Internet privacy / Educational psychology / Intranet / Social information processing / Organizational learning / Project management / KPMG

The knowledge trap: an intranet implementation in a corporate environment – Chapter 5: Findings from the review of the company documentation and interviews with knowledge management directorate staff CHAPTER 5

Add to Reading List

Source URL: drhazelhall.files.wordpress.com

Language: English - Date: 2013-01-08 08:11:10
UPDATE