Logical security

Results: 112



#Item
11Electronic engineering / Mobile telecommunications / Logical Link Control / SMS / Wireless modem / Subscriber identity module / Hayes command set / Mobile phone / Information security management system / Technology / Mobile technology / Modems

SMSFinder User Guide for SF100, SF400, SF800 models

Add to Reading List

Source URL: downloads.inlogic.dk

Language: English - Date: 2013-02-21 03:40:56
12Virtualization / Hypervisor / Hyper-V / Desktop virtualization / Virtual private server / Application virtualization / Full virtualization / Paravirtualization / Logical partition / System software / Software / Virtual machines

Special PublicationGuide to Security for Full Virtualization Technologies Recommendations of the National Institute

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
13United Nations / Environment / Food and Agriculture Organization / United Nations Development Group / Food security / United States Agency for International Development / Food politics / Food and drink / Security

Overall Objective LOGICAL FRAMEWORK Intervention Improved functioning of local

Add to Reading List

Source URL: www.vng-international.nl

Language: English - Date: 2012-09-26 10:31:21
14Computer storage / Disk formatting / OS/2 / Hard disk drive / Backup / Computer security / Logical volume management / Multilevel security / Computing / Computer hardware / Security

Configuring Storage Area Networks Using Mandatory Security Benjamin Aziz≀∗ Simon N. Foley†

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2008-09-03 07:48:21
15Computer hardware / Technology / Modems / Logical Link Control / DSL modem / Universal Serial Bus / Asymmetric digital subscriber line / DSL filter / Wireless security / Digital subscriber line / Electronics / Networking hardware

Comtrend Wireless Modem Guide 2010.qxp

Add to Reading List

Source URL: www.tcc.coop

Language: English - Date: 2011-11-07 10:38:00
16Logical consequence / Logical syntax / Metalogic / Natural deduction / Logic / Deduction / Entailment

From Exponential to Polynomial-time Security Typing via Principal Types Sebastian Hunt1 and David Sands2 1 2

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-03-01 05:21:51
17Proof theory / Non-classical logic / Philosophical logic / Logical syntax / Computer security / Modal logic / Mathematical proof / Linear logic / Formal verification / Logic / Mathematics / Logic in computer science

Manifest Security Karl Crary Robert Harper Frank Pfenning Carnegie Mellon University Benjamin C. Pierce Stephanie Weirich Stephan Zdancewic University of Pennsylvania January 2007

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2007-02-05 13:01:30
18Deduction / Propositional calculus / Philosophical logic / Logical consequence / Information flow / Entailment / Modal logic / Computer security / Soundness / Logic / Mathematical logic / Proof theory

Manifest Security for Distributed Information Karl Crary Robert Harper Frank Pfenning Carnegie Mellon University Benjamin C. Pierce Stephanie Weirich Stephan Zdancewic University of Pennsylvania March 6, 2006

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2006-03-07 09:37:45
19Software / Logical security / Password / Form / Computing

User Guide Checking availability and booking process When you receive your username and password you are now ready to start booking your BizBeds rates. 1. To check availability and make a reservation on BizBeds, follow

Add to Reading List

Source URL: www.mghotels.com.au

Language: English - Date: 2015-04-13 00:14:13
20Tribhuvan University / Center for a New American Security

Logical Framework - Tribhuvan University Platform for Stability, Democracy Rights Activity Plan, Platform for Stability, Democracy & Rights: Tribhuvan University Development Objective:

Add to Reading List

Source URL: bsusdr.org

Language: English - Date: 2012-01-17 03:41:40
UPDATE