Lydia

Results: 851



#Item
121Mobile security / Internet privacy / Privacy / Surveillance / BlackBerry Priv / Medical privacy / Email / Outlook.com

Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy May 21st 2015 Lydia Kraus*, Tobias Fiebig*, Viktor Miruchna*, Sebastian Möller*, Asaf Shabtai+ * Technische Universität Berlin +

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-30 16:32:13
122

Busy Mom Entrepreneur Keeping it Green, purchases Rugrats Resale to Recycle Kids Clothing and Toys Lydia Myers, owner Rugrats Resale, LLC

Add to Reading List

Source URL: sbdc.psu.edu

Language: English - Date: 2015-08-06 15:56:20
    123

    LETTERS Toll-like receptor activation suppresses ER stress factor CHOP and translation inhibition through activation of eIF2B Connie W. Woo1 , Lydia Kutzler2 , Scot R. Kimball2 and Ira Tabas1,3

    Add to Reading List

    Source URL: www.tabaslab.com

    Language: English - Date: 2012-04-03 09:24:18
      124

      Managing  Energy  Use  in  the   Nantucket  Municipal  System   December  18,  2013     Melissa  Dery,  Lydia  George,  Ryan  McKenna,  Nicholas  Rice  

      Add to Reading List

      Source URL: www.ackenergy.org

      Language: English - Date: 2014-02-05 11:32:56
        125Law / United States copyright law / Asset Marketing Systems /  Inc. v. Gagnon / Intellectual property law / Copyright law / Data / Information / Implied license / Copyright law of the United States / Software license / Copyright / Fair use

        Excerpts from Third Edition of C.O.O.L. Copyright Used in Professor Ohm’s class with permission from Lydia Loren CHAPTER 8 COPYRIGHT AND CONTRACT In Chapter 1 you learned about the significant economic role of industri

        Add to Reading List

        Source URL: paulohm.com

        Language: English - Date: 2010-04-12 01:30:28
        126

        The Cybernetic Unconscious: Rethinking Lacan, Poe, and French Theory Lydia H. Liu A short text comes to our aid, from Edgar Poe, which the cyberneticists, I noticed, make something of. The text is in The Purloined Letter

        Add to Reading List

        Source URL: philo.at

        Language: English - Date: 2012-11-23 03:55:54
          127Smartphones / Computer security / Cloud clients / Cryptography / National security / Mobile security / Internet privacy / Privacy / Information security / Android / Threat / Transport Layer Security

          Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy Lydia Kraus∗ , Tobias Fiebig∗ , Viktor Miruchna∗ , Sebastian M¨oller∗ and Asaf Shabtai† ∗ Technische Universit¨at B

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-05-20 23:58:46
          128

          Sexual Violence Prevention By David S. Lee, M.P.H., Lydia Guy, B.A., Brad Perry, M.A., Chad Keoni Sniffen, B.A., and Stacy Alamo Mixson, M.P.H. F

          Add to Reading List

          Source URL: www.preventconnect.org

          Language: English - Date: 2011-10-26 14:42:08
            129

            Argonaut: Macrotask Crowdsourcing for Complex Data Processing Daniel Haas} Jason Ansel| Lydia Gu| Adam Marcus~ AMPLab, UC Berkeley}

            Add to Reading List

            Source URL: marcua.net

            Language: English - Date: 2015-09-01 13:32:20
              130

              Finding a needle in a haystack: parsing large-scale data to define regulatory networks for strain engineering Lydia María Contreras, University of Texas at Austin

              Add to Reading List

              Source URL: engineering.tamu.edu

              Language: English - Date: 2015-10-06 12:35:23
                UPDATE