Jansen

Results: 839



#Item
631

User Guide 2.0 Leigha J. Jansen, Ed.D., CCC-A Clint Johnson, M.A., CCC-SLP Katie Ondo, M.A., CCC-SLP Brenda Pantalone, M.Ed. Stacy L. Williams, Ph.D.

Add to Reading List

Source URL: c2630440745ec56453fe-4b47e81df9184afd10797caf49eafabb.r47.cf2.rackcdn.com

- Date: 2014-08-27 08:06:45
    632Security / Computing platforms / Computer security / X.509 / PERMIS / Authorization certificate / Public key certificate / Revocation list / Mobile agent / Computing / Public-key cryptography / Key management

    A Privilege Management Scheme for Mobile Agent Systems W. A. Jansen National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    633ISO standards / Ubiquitous computing / Computer security / X.509 / PERMIS / Public key certificate / Smart card / Technology / Personal digital assistant / Public-key cryptography / Computing / Key management

    Security Policy Management for Handheld Devices Wayne A. Jansen, Tom Karygiannis The National Institute of Standards and Technology, {Wayne.Jansen,Tom.Karygia

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    634Cigna / Characters of Devil May Cry / Medicare / Healthcare Common Procedure Coding System / Harry August Jansen / Interactive voice response / Positive airway pressure / Okay / Medicine / Health / Healthcare reform in the United States

    Microsoft Word - December[removed]General ACT Call Transcript1.doc

    Add to Reading List

    Source URL: www.cgsmedicare.com

    Language: English - Date: 2011-05-31 16:52:14
    635Cryptographic protocols / Internet protocols / Internet standards / Secure communication / Bluetooth / Security token / Transport Layer Security / Beacon / Authentication / Technology / Computing / Security

    Proximity-based Authentication for Mobile Devices Wayne Jansen Serban Gavrila Vlad Korolev

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    636Public economics / Taxation in the United States / Property taxes / Tax reform / Political economy / Business / Sales taxes in the United States / Income tax in the United States / Finance / Public finance / Tax

    (Updated: July[removed]Primary Election Ballot Proposal Public Act (PA) 80 of 2014 was introduced by Senators Hildenbrand, Jansen, Warren, Moolenaar and Brandenburg and approved by Governor Snyder on March 28, 2014. Acc

    Add to Reading List

    Source URL: www.mha.org

    Language: English - Date: 2014-07-10 13:38:32
    637Tooltip / Dialog box / GUI widget / Toolbar / Computer icon / Mac OS X Tiger / Google Toolbar / Taskbar / Software / System software / Graphical user interface elements

    Christian Jansen , September 2001, Sun Microsystems ContentContent _Introduction_ 2 _Layout_ 2 _Size_ 2

    Add to Reading List

    Source URL: www.openoffice.org

    Language: English - Date: 2014-04-19 19:39:50
    638Glacial landforms / True seals / Glacier Bay National Park and Preserve / Glacier / College Fjord / Fjord / Tracy Arm / Icy Bay / Harbor seal / Geography of Alaska / Alaska / Geography of the United States

    How Close Is Too Close? Acting on short-term disturbance to seals amidst uncertainty about long-term impacts and vessel compliance under the U.S. Marine Mammal Protection Act (MMPA) John Jansen • Peter Boveng • Shawn

    Add to Reading List

    Source URL: access.afsc.noaa.gov

    Language: English - Date: 2010-02-01 12:10:28
    639Records management / Archive / Archivist / Business / National Archives and Records Administration / Accountability / Education in the United States / Margaret Hedstrom / Adam Jansen / Content management systems / Information technology management / Administration

    [removed]CASE STUDIES: UNIVERSITIES Electronic Records Program at Penn State University by Lee Stout, University Archivist

    Add to Reading List

    Source URL: www.archimuse.com

    Language: English - Date: 2011-09-09 18:19:18
    640Computer security / Computing / Cyberwarfare / Access control / Identity management / X.509 / PERMIS / Authorization certificate / Public key certificate / Public-key cryptography / Security / Key management

    Determining Privileges of Mobile Agents Wayne A. Jansen National Institute of Standards and Technology [removed] Abstract This paper describes a method for controlling the

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    UPDATE