Computer files

Results: 3256



#Item
121Internet privacy / World Wide Web / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet marketing / Information privacy / Marketing / Computer security / Web analytics / Opt-out / Targeted advertising

Cookies and privacy Use of cookies by www.f4f.com Cookies are small text files that are placed on your computer by websites that you visit. They are widely used in order to make websites work, or work more efficiently, a

Add to Reading List

Source URL: www.f4f.com

Language: English - Date: 2016-02-10 08:14:44
122Computer security / Security / Access control / Computer access control / Role-based access control / Identity management / PERMIS / JavaOne / NIST RBAC model

CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOne

Add to Reading List

Source URL: iamfortress.files.wordpress.com

Language: English - Date: 2016-07-28 18:23:00
123United States Department of Homeland Security / DHS National Protection and Programs Directorate / Critical infrastructure protection / National Infrastructure Protection Plan / Critical infrastructure / United States Computer Emergency Readiness Team / Homeland security / National Cyber Security Division / Stephenson Disaster Management Institute

JulyVolume 2, Issue 2 The Partnership Quarterly includes critical infrastructure security and resilience articles, highlights cross-sector initiatives, and identifies training and exercise opportunities, new tools

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2015-11-10 09:34:37
124Lansing  East Lansing metropolitan area / Eaton County /  Michigan / Eaton / Vermontville Township /  Michigan / Yes

www.miegs.org Eaton County Genealogical Society Computer Scanned Files List Scan

Add to Reading List

Source URL: www.miegs.org

Language: English - Date: 2016-06-20 08:38:42
125Archive formats / Computer file / Inter-process communication / Tar / Microsoft Excel / GNU Core Utilities

Voter Registration Files This CD contains multiple compressed files containing voter registration information. The individual files are not created in a specific order, and provide information for active and inactive vo

Add to Reading List

Source URL: coloradovoters.info

Language: English - Date: 2015-10-16 20:30:24
126Software architecture / Web framework / XQuery / Ruby on Rails / Modelviewcontroller / BaseX / Solution stack / Web application / Play Framework / XRX / ASP.NET MVC

University of Konstanz Department of Computer and Information Science Master esis for the degree Master of Science (M.Sc.) in Information Engineering

Add to Reading List

Source URL: files.basex.org

Language: English - Date: 2012-04-18 14:53:16
127Preservation / Records management / Digital libraries / Computer files / Digital preservation / PRONOM / File format / UVC-based preservation / Global Digital Format Registry / GDFR / JHOVE / Archive file

Using Scalable and Secure Web Technologies to Design a Global Digital Format Registry Prototype: Architecture, Implementation, and Testing Muluwork Geremew, Sangchul Song, and Joseph JaJa; Institute for Advanced Computer

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2008-09-10 19:12:44
128TeX / Typesetting / Digital typography / PostScript / Donald Knuth / TeX Directory Structure / Metafont / MetaPost / Device independent file format / Dvips / Computer font / Computer Modern

A Directory Structure for TEX Files TUG Working Group on a TEX Directory Structure (TWG-TDS) version 1.1 June 23, 2004 c 1994, 1995, 1996, 1997, 1998, 1999, 2003, 2004 TEX Users Group. Copyright Permission to use, copy

Add to Reading List

Source URL: ctan.mirror.ftn.uns.ac.rs

Language: English - Date: 2004-06-23 13:24:00
129File manager / Computer file / Windows Vista / File Explorer / AppleScript

1. Book Port Series Maria E. Delgado 2. All about E-text Files and Navigation within the Files American Printing House for the Blind

Add to Reading List

Source URL: www.aph.org

Language: English - Date: 2016-01-11 10:18:45
130Guccifer 2.0 / Computer security / CrowdStrike / Data security / Guccifer / Security hacker / Information security

Potential for false flag operations in the DNC Hack Jake Williams Rendition Infosec rsec.us @MalwareJake

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:35
UPDATE