Computer data

Results: 44615



#Item
481Security / Data management / Computing / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Data / Computer emergency response team / Search engine indexing

Data Mining in Incident Response Challenges and Opportunities Alexandre Dulaunoy TLP:WHITE Information Security Education

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-08-11 10:49:35
482Data security / Internet privacy / Privacy / Data protection / Identity management / Computing / Computer security / HTTP cookie / Information privacy / Web portal / Directive on Privacy and Electronic Communications / Data Protection Act

PRIVACY POLICY for the portal http://infoshare.pl (also published as http://theinfoshare.org) § 1. General provisions 1. This Privacy Policy sets forth the rules for the processing and protection of personal data of Por

Add to Reading List

Source URL: infoshare.pl

Language: English - Date: 2016-02-08 04:34:19
483Analysis of algorithms / Computational complexity theory / Time complexity / Computer science / Algorithm / Mathematics / Academia / Oblivious data structure

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 1, 2011 Problem Set 1

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-02-07 15:14:45
484Computing / GIS file formats / United States Geological Survey / Computer architecture / Cartography / Digital line graph / Extract /  transform /  load / Geographic information system / Cell / USGS DEM / Hash function / Tar

FORMATTING GEOGRAPHIC DATA TO ENHANCE MANIPULABILITY Gail Langran Mapping, Charting, and Geodesy Division Naval Ocean Research and Development Activity NSTL, Mississippi 39529

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 00:26:19
485Computing / Data / Information / Data management / Database management systems / Machine learning / Record linkage / Database / Probabilistic database / Uncertain data / Social network / Information retrieval

Managing Uncertainty in Social Networks Eytan Adar and Christopher R´e Department of Computer Science and Engineering University of Washington {eadar,chrisre}@cs.washington.edu Abstract

Add to Reading List

Source URL: www.cond.org

Language: English - Date: 2007-07-02 17:30:57
486Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:40
487Computing / Internet privacy / Law / Computer security / Information privacy / Privacy policy / Privacy / HTTP cookie / Medical privacy / Personal /  Inc. / Data Protection Act / P3P

PRIVACY POLICY BACKGROUND: This Policy applies as between you, the User of this Website and Call Print Group Limited the owner and provider of this Website. This Policy applies to our use of any and all Data collected by

Add to Reading List

Source URL: www.callprint.co

Language: English - Date: 2015-07-20 10:13:05
488Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
489Algebra / Mathematics / Linear algebra / Matrix theory / Parallel computing / Cache / Computer memory / Cache memory / Data parallelism / Matrix / Exponentiation / Trace

Foundations of Programming for High Performance Computing: CS2101UWO, November, 5, Student name:

Add to Reading List

Source URL: www.csd.uwo.ca

Language: English - Date: 2014-09-18 01:00:30
490Computing / Technology / Computer hardware / Intel vPro / Laptops / Intel / Out-of-band management / Intel AMT versions / Centrino

Protect Laptops and Data with Intel® Anti-Theft Technology It’s not your laptop. It’s your business. Lock it tight. Technology Brief for IT Professionals 3rd generation Intel® Core™ processor family Intel® Anti-

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2013-04-17 10:42:14
UPDATE