Computer law

Results: 22619



#Item
471Intellectual property law / Law / Copyright law / Copyleft / Computer law / Civil law common law) / Information / Public copyright licenses / Copyright law of the United States / Copyright / Fair use / Creative Commons license

Know Your Copy Rights ™ Often you can use works in your teaching without permission or fee. This chart highlights some of those situations. However, there are other circumstances

Add to Reading List

Source URL: www.knowyourcopyrights.org

Language: English - Date: 2015-03-23 14:23:19
472Computing / Computer architecture / Computer file formats / Markup languages / Open formats / Computer law / GNU Project / GNU General Public License / Xe / Loadable kernel module

Developer Manual Copyright Copyright © 2011 NHN Corp. All Rights Reserved. This document is provided for information purpose only. NHN Corp. has endeavored to verify the

Add to Reading List

Source URL: www.xpressengine.com

Language: English - Date: 2014-01-07 04:22:41
473Net neutrality / Internet access / Government / Law / Communication / FCC Open Internet Order / Computer law / Federal Communications Commission / Internet service provider / Tom Wheeler / Tim Wu / Net neutrality in the United States

“ICLE  &  TechFreedom  Policy  Comments” Comments of International Center for Law and Economics1 Geoffrey Manne, Executive Director Ben Sperry, Associate Director

Add to Reading List

Source URL: laweconcenter.org

Language: English - Date: 2014-07-18 14:28:36
474Free and open-source software licenses / Law / Open-source movement / NASA Open Source Agreement / Indemnity / Economy / Free software / Business / Software license / XCore Open Source License

NASA OPEN SOURCE AGREEMENT VERSION 1.3 THIS OPEN SOURCE AGREEMENT (“AGREEMENT”) DEFINES THE RIGHTS OF USE, REPRODUCTION, DISTRIBUTION, MODIFICATION AND REDISTRIBUTION OF CERTAIN COMPUTER SOFTWARE ORIGINALLY RELEASED

Add to Reading List

Source URL: www-cave.larc.nasa.gov

Language: English - Date: 2015-01-15 13:19:41
475Computer law / Intellectual property law / Recording Industry Association of America / Peer-to-peer file sharing / Motion Picture Association of America / Copyright Alert System / Center for Copyright Information / Graduated response / Copyright / Trade group efforts against file sharing

EMBARGOED UNTIL 11:00 AM ET, JULY 7, 2011 Contact: Kristen Hainen Direct: Cell:

Add to Reading List

Source URL: hfa-commandcenter-prod.s3.amazonaws.com

Language: English - Date: 2015-08-18 11:04:44
476

Budget Adjustments for Computer Purchases

Add to Reading List

Source URL: law.syr.edu

Language: English - Date: 2015-05-01 16:01:17
    477Online law databases / New York state courts / New York State Courts Electronic Filing System / Legal documents / Cybercrime / Cryptography / Password / Filing / Simulation / User / Computer security / Electronic Filing System

    NEW YORK STATE UNIFIED COURT SYSTEM NEW YORK STATE COURTS ELECTRONIC FILING USER REGISTRATION for NYSCEF TRAINING SYSTEM The New York State Courts Electronic Filing System (“NYSCEF”) permits users to file

    Add to Reading List

    Source URL: iappscontent.courts.state.ny.us

    Language: English - Date: 2014-07-23 14:25:22
    478Academia / Knowledge / Engineering / Abstraction / Philosophy of artificial intelligence / Formal sciences / Complex systems theory / Computer engineering / Computer science / Philosophy of information / Philosophy / Mathematics

    Philosophy of Computer Science: PoC Meets AI and Law (Roundtable Discussion) Organized by Rainhard Bengez, TU Muenchen, Germany () Raymond Turner, University of Essex, UK ()

    Add to Reading List

    Source URL: events.cs.bham.ac.uk

    Language: English - Date: 2011-12-13 05:13:50
    479

    Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2010-07-16 14:58:20
      480Software / Computing / Computer access control / Computer security / Hacking / Social engineering / User interface techniques / Security / Cross-site request forgery / Cross-site scripting / Phishing / Clickjacking

      A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

      Language: English
      UPDATE