Permissions

Results: 1263



#Item
591Bootstrapping / Logistic regression / Dummy variable / Generalized linear model / Normal distribution / Phylogenetic tree / Correlation and dependence / Least squares / Variance / Statistics / Regression analysis / Linear regression

Syst. Biol. 59(1):9–26, 2010 c The Author(s[removed]Published by Oxford University Press, on behalf of the Society of Systematic Biologists. All rights reserved. For Permissions, please email: journals.permissions@oxfor

Add to Reading List

Source URL: biology.ucr.edu

Language: English - Date: 2009-12-15 13:59:57
592Filesystem permissions / Document management systems / Collaboration / Intranet portal / ShareMethods / Computing / Web portal / Shared resource

Make your customers and partners happy 1 Keep everyone on the same page

Add to Reading List

Source URL: mediasvc08rg9b3g5vnth.blob.core.windows.net

Language: English - Date: 2014-05-16 19:19:15
593Embedded Linux / Computing / Google / Cloud clients / Filesystem permissions / Android Market / Rooting / Smartphones / Software / Android

Distributed Computing Prof. R. Wattenhofer BA/MA/SA/Group/Lab: Fooling the Android Permission System

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2014-05-16 05:21:05
594System software / Windows / ExtremeZ-IP / Directory services / GroupLogic / Distributed File System / NTFS / Active Directory / Filesystem permissions / Computing / Software / Network file systems

WHITE PAPER Active Directory Compatibility with ExtremeZ-IP® A Technical Best Practices Whitepaper

Add to Reading List

Source URL: www.acronis.com

Language: English - Date: 2014-07-25 00:51:40
595Filesystem permissions / Permission / Checkbox

Giving Consent to Title IV Permissions

Add to Reading List

Source URL: erptraining.niu.edu

Language: English - Date: 2014-09-23 15:45:52
596Smartphones / Android / Free software / OWASP / Filesystem permissions / Application security / Operating system / Android Market / Software / Computing / Embedded Linux

An In-Depth Introduction to the Android Permission Model and How to Secure Multi-Component Applications Jeff Six

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:42:10
597Superuser / Computing / System administration / User / Filesystem permissions

eThority  Access  Request Employee Job  Title Supervisor Department CSU  eID  Name

Add to Reading List

Source URL: www.cvmbs.colostate.edu

Language: English - Date: 2013-10-03 14:37:20
598

Usage and Permissions for International Networking Week in Documents and Marketing Copy ● Contact us to obtain permissions: http://internationalnetworkingweek.com/contact-us/

Add to Reading List

Source URL: internationalnetworkingweek.com

- Date: 2012-12-14 16:42:52
    599Security / Kerberos / Authentication / Security token / Challenge-response authentication / Apple Open Directory / IEEE 802.1X / Computer security / Computing / Computer network security

    Authentication, Authorization, and Permissions Guide Contents

    Add to Reading List

    Source URL: developer.apple.com

    Language: English - Date: 2015-02-09 20:58:03
    600Superuser / Online banking / Group / Payment systems / User / Filesystem permissions / Information technology management / System administration / Computing / System software

    [removed][removed]:44 Page 1 Coutts Online Administrator User Guide 90513726[removed]:44 Page 1

    Add to Reading List

    Source URL: www.coutts.com

    Language: English - Date: 2015-02-09 06:55:09
    UPDATE