Key control

Results: 4477



#Item
471Earth / Hydraulic engineering / Drainage / Water management / Landslide / Groundwater / Water table / Geotechnical engineering / Watertable control / Water / Aquifers / Hydrology

Information NoteApril 2015 Landslip Prevention and Mitigation Works at Po Shan, Mid-levels Key Message:

Add to Reading List

Source URL: www.cedd.gov.hk

Language: English - Date: 2015-04-14 23:08:02
472Federal Bureau of Investigation / Money laundering / FBI Most Wanted Terrorists / Robert Hanssen / Office of Foreign Assets Control / FBI Ten Most Wanted Fugitives / Business / Specially Designated Global Terrorist / International sanctions / Spies / International relations

OFACplus Risk management and compliance are key issues facing today’s global organizations. OFACplus is a data service that aggregates high-risk watch lists into a single, easy to use data file or web service that can

Add to Reading List

Source URL: www.nominodata.com

Language: English - Date: 2014-10-03 15:13:49
473Control key / Diff / Pages / Button / Software / Computing / System software

A HALLMARK OF INNOVATION AND EXCELLENCE SINCE 1908 Color Separations Flexographic Plates 3M Distributor Cheat Sheet Topic: Comparing Documents in the WebCenter Viewer

Add to Reading List

Source URL: www.preplate.com

Language: English - Date: 2015-03-05 14:47:31
474Cryptographic software / Remote administration software / Portable software / Secure Shell / Telnet / PuTTY / Control key / TtyEmulator / Software / Computing / System software

SSH access to the DIMDI databases

Add to Reading List

Source URL: www.dimdi.de

Language: English - Date: 2015-05-20 03:55:44
475Software / Debuggers / Control key / Computing

HTTP DEBUGGER FAQ 1. What is the HTTP Debugger Pro? The HTTP Debugger Pro is a full-scale tool for IT professionals for capturing, viewing and analyzing the

Add to Reading List

Source URL: www.httpdebugger.com

Language: English - Date: 2014-11-29 00:01:11
476Computer security / Computer network security / Crime prevention / National security / Public-key cryptography / Key management / Group Policy / Access control / Security policy / Security / Cryptographic protocols / Cryptography

Principles of Policy in Secure Groups Hugh Harney Andrea Colgrove SPARTA, Inc.

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:21:03
477Randomness extractor / Applied mathematics / Mathematics / Calculus / Continuous function

Achieving Differential Privacy with Bias-Control Limited Source Yanqing Yaoa,b , Zhoujun Lia,c a State Key Laboratory of Software Development Environment, Beihang University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 23:01:04
478Cloud feedback / S6 / Control key / Cloud / 2K / METAR / Liquid water content / Atmospheric sciences / Meteorology / Climate forcing

Analysis of CGILS results for LMD/IPSL model Florent Brient, Sandrine Bony, Jean-Louis Dufresne Laboratoire de Meteorologie Dynamique / IPSL March,1st 2010

Add to Reading List

Source URL: www.lmd.jussieu.fr

Language: English - Date: 2011-07-19 10:42:48
479Biometrics / Access control / Surveillance / Fingerprint recognition / Fingerprint / Public key fingerprint / Universal Serial Bus / Fingerprints / Security / Identification

FxQuicky Fingerprint Scanner (MatchMatch-onon-Board) Board) Technical specifications

Add to Reading List

Source URL: www.biometrika.it

Language: English - Date: 2015-04-16 08:36:25
480Shift key / Polygon / Dimension / 3D computer graphics / Control key / Vertex

3D FeatureXtract Hot Keys 3D FeatureXtract is an all-in-one complex feature extraction and 3D modeling software system developed with the defined objective of improving the process workflow experience. Its sole purpose i

Add to Reading List

Source URL: www.pcigeomatics.com

Language: English - Date: 2015-04-28 10:30:24
UPDATE