Protected computer

Results: 695



#Item
241Password / Button / Software / Wireless security / Wi-Fi Protected Access / Computer network security / Computing / IEEE 802.1X

Instructions for OSX (10.6+) Snow Leopard 1) Go to the Apple Menu, and select System Preferences 2) Click the Network system preference icon in the third row 3) Click AirPort on the left, and click Advanced... at the b

Add to Reading List

Source URL: www.jefferson.edu

Language: English - Date: 2014-04-11 09:54:39
242Jurisdiction / Computer law / Cyberwarfare / Economic Espionage Act / Computer Fraud and Abuse Act / Industrial espionage / Protected computer / Theft / Espionage / Law / Trade secrets / Civil procedure

BNA’s Patent, Trademark & Copyright Journal ®

Add to Reading List

Source URL: www.morganlewis.com

Language: English - Date: 2014-12-19 14:49:20
243IEEE 802.1X / Wireless security / Wi-Fi Protected Access / RADIUS / EAP-SIM / Virtual private network / Point-to-Point Tunneling Protocol / Wi-Fi / IEEE 802.11r-2008 / Computing / Computer network security / Computer security

Deploying iPhone and iPad Virtual Private Networks Secure access to private corporate networks is available on iPhone and iPad using established industry-standard virtual private network (VPN) protocols. Users can easily

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:06:02
244X86 architecture / Programming language implementation / Booting / Real mode / Interrupt vector table / Interrupt descriptor table / Protected mode / Intel APIC Architecture / INT / Computer architecture / Interrupts / BIOS

White Paper Jenny M Pelner James A Pelner Firmware Architects Intel Corporation

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2011-09-21 13:35:07
245Earth / Indigenous and Community Conserved Area / World Database on Protected Areas / Marine protected area / Governance / Independent Computer Consultants Association / Protected areas / Environment / Human geography

ICCA Registry Questionnaire Welcome to the Indigenous and Community Conserved Areas (ICCA) Registry Questionnaire. Information submitted via this questionnaire will be added to the ICCA Registry - a secure database maint

Add to Reading List

Source URL: www.iccaregistry.org

Language: English - Date: 2014-09-09 05:35:10
246Assembly languages / Compiler construction / Data structure alignment / Intel / Protected mode / MOV / Instruction prefetch / X86 / Addressing mode / Computer architecture / Computing / Instruction set architectures

PDF Document

Add to Reading List

Source URL: downloads.gamedev.net

Language: English - Date: 2011-08-09 01:03:18
247Graphics hardware / Concurrent computing / Scheduling algorithms / Video cards / Planning / Scheduling / OpenCL / CUDA / Graphics processing unit / GPGPU / Computing / Computer hardware

Disengaged Scheduling for Fair, Protected Access to Fast Computational Accelerators Konstantinos Menychtas Kai Shen

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2014-01-17 08:57:06
248Computer security / Law / Protected health information / Email encryption / Password / Privacy / Jumbleme / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

Microsoft Word - Website Language ZixCorp Communication.doc

Add to Reading List

Source URL: www.wsp.aibpa.com

Language: English - Date: 2010-02-09 19:47:52
249Technology / Cryptographic protocols / Computer security / Wireless security / Data security / Aruba Networks / IEEE 802.1X / Wireless access point / Wi-Fi Protected Access / Computer network security / Computing / Wireless networking

Developing a Sound Security Policy for Mobility at the Department of Defense Developing a Sound Security Policy for Mobility at the Department of Defense

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2015-01-15 18:27:09
250Law / Software copyright / Information / Copyright / Software / Software metering / Proprietary software / Software licenses / Computer law / Intellectual property law

Computing Software Copyright Original Implementation: July 27, 1999 Last Revision: January 31, 2012 Purpose and Scope Most software on computers at Stephen F. Austin State University is protected by federal copyright law

Add to Reading List

Source URL: www.sfasu.edu

Language: English - Date: 2015-02-10 12:34:07
UPDATE