Data USA

Results: 1930



#Item
811Data security / Data privacy / Electronic commerce / McAfee / Payment Card Industry Data Security Standard / Qualys / Vulnerability / Risk and compliance / Security controls / Computer security / Cyberwarfare / Security

BUYER CASE STUDY Fashion Retailer Employs McAfee Risk Advisor to Automate Compliance and Risk Management Requirements Vivian Tero Global Headquarters: 5 Speen Street Framingham, MA[removed]USA

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-02-04 04:33:06
812Seismology / San Andreas Fault / San Francisco earthquake / Fault / Paleoseismology / Earthquake / Active fault / Seismic hazard / Southern California Earthquake Center / Geology / Geography of California / Structural geology

Paleoseismic and geologic data for earthquake simulation Lisa B. Grant(1) and Miryha M. Gould[removed]Department of Environmental Analysis & Design, University of California, Irvine, California[removed], USA (email: lgr

Add to Reading List

Source URL: quakes.earth.uq.edu.au

Language: English - Date: 2003-11-13 02:58:12
813Data security / Data privacy / Electronic commerce / McAfee / Payment Card Industry Data Security Standard / Qualys / Vulnerability / Risk and compliance / Security controls / Computer security / Cyberwarfare / Security

BUYER CASE STUDY Fashion Retailer Employs McAfee Risk Advisor to Automate Compliance and Risk Management Requirements Vivian Tero Global Headquarters: 5 Speen Street Framingham, MA[removed]USA

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-02-04 04:33:06
814Internet protocols / Routing protocols / Fault-tolerant computer systems / IP multicast / Multicast / Communications protocol / Reliable multicast / Consensus / JGroups / Computing / Network architecture / Data

SWIM: Scalable Weakly-consistent Infection-style Process Group Membership Protocol Abhinandan Das, Indranil Gupta, Ashish Motivala Dept. of Computer Science, Cornell University Ithaca NY[removed]USA  asdas,gupta,ashish

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2004-03-17 10:36:20
815Equations / Algebra / Applied mathematics / Multiple representations / Spreadsheet / Equation / Reduction / Expression / Mathematics / Mathematics education / Equation solving

Strategic Support of Algebraic Expression Writing Mary A. Mark and Kenneth R. Koedinger School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA Abstract. The examination of user data as a basis for de

Add to Reading List

Source URL: pact.cs.cmu.edu

Language: English - Date: 2014-10-14 08:57:45
816Weather prediction / Computational science / Climate forcing / Global climate model / Global warming / Statistical forecasting / Sea surface temperature / Hindcast / Zonal and meridional / Atmospheric sciences / Meteorology / Climatology

Seasonal Forecast Data Description IDENTIFICATION Member Economy USA

Add to Reading List

Source URL: www.apcc21.org

Language: English - Date: 2014-11-19 20:28:33
817Software bugs / Address space layout randomization / Microsoft Windows / Resource Interchange File Format / NX bit / ANI / Buffer overflow protection / Data Execution Prevention / Computer virus / Computer security / Computing / Cyberwarfare

VIRUS BULLETIN www.virusbtn.com EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
818Data security / Data privacy / Electronic commerce / McAfee / Payment Card Industry Data Security Standard / Qualys / Vulnerability / Risk and compliance / Security controls / Computer security / Cyberwarfare / Security

BUYER CASE STUDY Fashion Retailer Employs McAfee Risk Advisor to Automate Compliance and Risk Management Requirements Vivian Tero Global Headquarters: 5 Speen Street Framingham, MA[removed]USA

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-02-04 04:33:06
819Law enforcement / Crime prevention / Surveillance / Independent Commission Against Corruption / Section summary of the USA PATRIOT Act /  Title II / National security / Security / Privacy of telecommunications

Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2014-06-10 20:55:19
820Research methods / Social media / Social information processing / Data collection / Grammar / Twitter / Crowdsourcing / Self-report study / Social networking service / Science / World Wide Web / Technology

Estimating the Social Costs of Friendsourcing Jeffrey M. Rzeszotarski1,2, Meredith Ringel Morris1 1 Microsoft Research, Redmond, WA, USA 2 Human-Computer Interaction Institute, Carnegie Mellon University, Pittsburgh, PA,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-03-13 15:17:36
UPDATE