COM

Results: 3714902



#Item
271

die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club T-Com macht’s möglich

Add to Reading List

Source URL: ds.ccc.de

Language: German - Date: 2006-03-14 18:33:00
    272Health / Substance abuse / Alcohol abuse / Substance dependence / Mental health professionals / Addiction / Drug rehabilitation / Medical record / Medical privacy / Privacy policy / Health care / Health Insurance Portability and Accountability Act

    SENSITIVE INFORMATION POLICY (MONTANA) PRIVACY POLICIES Collective Medical Technologies, Inc. Objective This Sensitive Information Policy (“Policy”) applies to all Services provided by Collective Medical Techn

    Add to Reading List

    Source URL: www.collectivemedicaltech.com

    Language: English - Date: 2018-03-20 02:32:06
    273Compiler construction / Software engineering / Programming language theory / Computing / Compiler optimizations / Formal languages / Data-flow analysis / Incremental computing / Abstract syntax tree / Control flow graph / Flow graph / Interval

    IncA: A DSL for the Definition of Incremental Program Analyses Tamás Szabó Sebastian Erdweg

    Add to Reading List

    Source URL: mbeddr.com

    Language: English - Date: 2018-08-02 04:06:51
    274Computer security / Computing / Cyberwarfare / Computer network security / Security engineering / Crime prevention / Cryptography / National security / Threat model / Threat / STRIDE / Information security

    Threat modeling, incident command, & DDoS mitigation Maarten Van Horenbeeck Vp of Security Engineering, Fastly Dr. Jose Nazario

    Add to Reading List

    Source URL: www.fastly.com

    Language: English - Date: 2018-01-30 17:52:40
    275Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

    Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    276

    Microsoft Word - Document1

    Add to Reading List

    Source URL: scioto.ohioboe.com

    - Date: 2017-04-24 16:21:11
      277Computing / Cloud computing / Information technology / FedRAMP / Internet security / United States Office of Management and Budget / Proprietary software / Carahsoft / In-Q-Tel / Splunk / Cloudera / Dell

      C A R A H S O F T. CO M / V E N D O R S Solutions for Government S A L E S @ C A R A H S O F T. CO M

      Add to Reading List

      Source URL: www.carahsoft.com

      Language: English - Date: 2018-09-12 14:13:00
      278Finance / Economy / Money / Swap Execution Facility / DoddFrank Wall Street Reform and Consumer Protection Act / Commodity Futures Trading Commission / Derivative / Jim Himes / Hedge fund / Swap / Commodity Futures Modernization Act / Swaps Regulatory Improvement Act

      Microsoft Word - WASHINGTON-#v3-WMBA_-_SEF_Clarification_Act_Letter_Support__House_Ag_.DOC

      Add to Reading List

      Source URL: www.wmbaa.com

      Language: English - Date: 2012-02-01 15:24:26
      UPDATE