Access key

Results: 1959



#Item
351Marine pollution / Convention for the Protection of the Marine Environment of the North-East Atlantic / Pollution / Electronic waste / Waste / Environmental impact assessment / Human impact on the environment / Environmental monitoring / International Council for the Exploration of the Sea / Environment / Earth / Ocean pollution

Following are some key reports that have been useful in developing waste assessment guidelines. It is far from a complete list. Some of these may be available from the LC/LP Secretariat. To facilitate access, reference

Add to Reading List

Source URL: www.imo.org

Language: English - Date: 2013-11-19 11:18:20
352Technology / Broadband / Data transmission / File sharing networks / Bandwidth / Signal processing / Contention ratio / Internet access / Network switch / Electronics / Computing / Network performance

Who’s Hogging The Bandwidth?: The Consequences Of Revealing The Invisible In The Home Marshini Chetty1, Richard Banks, Richard Harper, Tim Regan, Abigail Sellen, Christos Gkantsidis, Thomas Karagiannis and Peter Key Ge

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-03-03 10:05:38
353Cryptographic protocols / Secure communication / Electronic commerce / Network architecture / Transport Layer Security / FTPS / HTTP Secure / Public key certificate / SSL-Explorer: Community Edition / Computing / Internet / Internet standards

SSL Browser & Client Remote Access Browser and Client Global Technology Associates provides a SSL remote access solution featuring both a Browser and a Client for secure network access. GTA SSL Key Features • Seamless

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:38:44
354Security / Identification / Government / General contractor / Real estate / Identity document

Brass & Key/Card Access Contractor Procedures Follow the “Badge Application” process to obtain a contractor badge. If brass keys or card access is required, then follow the “Requesting Card Access/Brass Keys” pro

Add to Reading List

Source URL: fod.osu.edu

Language: English - Date: 2010-11-09 11:30:20
355User interface techniques / Control key / Insert key / Keyboard shortcut / Computer keyboard / Menu bar / Shift key / JAWS / Windows Explorer / System software / Software / Human–computer interaction

Information Services Quick guide to using JAWS JAWS (Job Access With Speech) is a screen reading technology which allows users to hear whatever is on screen.

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2014-07-22 10:41:10
356Vending machine / Business / National Asset Management Agency / Non-Agricultural Market Access / Nama

2014 MIDYEAR REPORT INTRODUCTION. This midyear report outlines NAMA’s key actions and outcomes for the first half ofThe comprehensive highlights align with the strategic goals of Advocacy, Education, Informati

Add to Reading List

Source URL: www.vending.org

Language: English - Date: 2014-10-08 16:32:52
357Cut /  copy /  and paste / Undo / Shift key / Ctrl / Mouse / Control-C / Software / Control key / Human–computer interaction / Computing

Filter rois by name Free and open-source bio image analysis download at http://icy.bioimageanalysis.org Search: Direct access to functionalities or plugins through search bar

Add to Reading List

Source URL: icy.bioimageanalysis.org

Language: English - Date: 2015-04-30 09:18:33
358Computer security / Internet / Anti-spam / Content filtering / Proxy server / Global Technology Associates /  Inc. / Content-control software / Firewall / Unified threat management / Computing / Computer network security / Spam filtering

Content Filtering Global Technology Associates’ Internet Access Management and Web Filtering subscription service for GB-OS System Software based firewalls. Key Features • Supports enforcement of Internet acceptable

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:38:44
359Public key infrastructure / Public key certificate / Certificate authority / Security token / Digital signature / Common Access Card / Authentication / Certificate policy / Revocation list / Cryptography / Public-key cryptography / Key management

DD Form 2842, DoD Public Key Infrastructure Certificate of Acceptance and Acknowledgement of Responsibilities - Subscriber, September 2002

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2012-05-08 13:03:42
360Terminology / Biodiversity / Federal Agency for Nature Conservation / Convention on Biological Diversity / Traditional knowledge / Certificate of origin / Public key certificate / In situ / Conservation biology / Biology / Commercialization of traditional medicines / Environment

Miriam Dross and Franziska Wolff New Elements of the International Regime on Access and BenefitSharing of Genetic Resources - the Role of Certificates of Origin -

Add to Reading List

Source URL: www.bfn.de

Language: English - Date: 2005-12-28 06:34:23
UPDATE