Computer files

Results: 3256



#Item
131Archive formats / Computer file / Inter-process communication / Tar / Microsoft Excel / GNU Core Utilities

Voter Registration Files This CD contains multiple compressed files containing voter registration information. The individual files are not created in a specific order, and provide information for active and inactive vo

Add to Reading List

Source URL: coloradovoters.info

Language: English - Date: 2015-10-16 20:26:38
132Earth observation satellites / Computer file formats / Orbiting Carbon Observatory 2 / Knowledge representation / NetCDF / Lite / Orbiting Carbon Observatory

OCO2_XCO2_Lite_Files_and_Bias_Correction_0716

Add to Reading List

Source URL: disc.sci.gsfc.nasa.gov

Language: English - Date: 2016-07-21 10:26:46
133Antivirus software / Content-control software / Webroot / Freeware / Rogue software / Malware / Computer virus / Avira / Spyware / Webroot Antivirus with Spy Sweeper / Webroot Internet Security Essentials

Reports and Files Download

Add to Reading List

Source URL: www.hsbcnet.com

Language: English - Date: 2015-07-02 02:18:35
134Disk encryption / Cryptographic software / Online backup services / Cryptography / Windows Vista / USB flash drive / TrueCrypt / Dropbox / BitLocker / Bluetooth / Encryption / Computer security

VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES Filming for human rights can be dangerous. It can put you, the people you are filming

Add to Reading List

Source URL: librarywebfiles.s3.amazonaws.com

Language: English - Date: 2015-05-12 14:38:07
135Fault-tolerant computer systems / Distributed algorithms / Distributed computing / Inter-process communication / Process theory / Virtual synchrony / Paxos / ACM SIGACT / Symposium on Principles of Distributed Computing / International Systems and Storage Conference / International Symposium on Distributed Computing / Byzantine fault tolerance

Research and Teaching Statement Dahlia Malkhi, PhD +Last updated: December 29, 2014

Add to Reading List

Source URL: dahliamalkhi.files.wordpress.com

Language: English - Date: 2014-12-30 13:27:26
136Computer security / National security / Crime prevention / Cryptography / Information governance / Intel / Triage / Computer forensics / Computer security incident management / Information security / Security / Global Information Assurance Certification

Collecting and Hunting for Indications of Compromise with Gusto and Style! SANS Threat Hunting & IR Summit – New Orleans, April 12, 2016 Ismael Valenzuela, GSE #132

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:25
137Network theory / Complex network / Clustering coefficient / Ume / Scale-free network / Betweenness centrality / Computer cluster / Centrality / Shortest path problem

Emergence of structure in growing networks Petter Holme Department of Theoretical Physics, Umea˚ University, Sweden March 14, 2002 overload breakdown

Add to Reading List

Source URL: petterholdotme.files.wordpress.com

Language: English - Date: 2015-09-22 01:14:30
138Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Google Analytics / Cookie / Web analytics / Zombie cookie

Cookie Policy for Agilion Consulting Sp. z o.o. Spółka Komandytowa What Are Cookies As is common practice with almost all professional websites this site uses cookies, which are tiny files that are downloaded to your c

Add to Reading List

Source URL: gorilla.agency

Language: English - Date: 2016-03-23 06:07:01
139Wireless sensor network / Data mining / Wireless networking / Cluster analysis / Geostatistics / Sensor node / Computer cluster / K-means clustering / Clustering

1 Towards Spatial Window Queries Over Continuous Phenomena in Sensor Networks Guang Jin and Silvia Nittel Department Of Spatial Information And Engineering

Add to Reading List

Source URL: silvianittel.files.wordpress.com

Language: English - Date: 2016-07-10 13:05:50
140Computer virus / Internet security / Password / Windows Vista / Antivirus software / Encrypting File System

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. Note: Rakhni creates

Add to Reading List

Source URL: noransom.kaspersky.com

Language: English - Date: 2016-06-04 09:22:41
UPDATE