Protected computer

Results: 695



#Item
381Data / Information / Law / Free content / Copyright law of the United States / Copyright / Domain / Proprietary software / Public domain / Intellectual property law / Computer law

NAME: Brian Takle CLASS: Literary works, including computer programs and databases, protected by access control mechanisms in which the mechanism controls access both to copyrighted works and to works not under copyright

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2012-05-24 14:27:06
382Reference / Information / ISO standards / Standards / Open formats / Document / Portable Document Format / Folder / File format / Computer file formats / Documents / Computing

2014 Requirements for Preparing Electronic Accreditation Applications The NACEP Accreditation Commission accepts only electronic applications submitted via its secure, password-protected document upload site. This docume

Add to Reading List

Source URL: nacep.org

Language: English - Date: 2014-03-19 04:19:50
383Computing / Cryptographic software / Microsoft Windows / Encryption / Wireless security / Wi-Fi Protected Access / USB flash drive / Wi-Fi / Plaintext / Disk encryption / Cryptography / Computer network security

State of Illinois Central Management Services Monthly Cyber Security Tips NEWSLETTER September 2012

Add to Reading List

Source URL: www.illinois.gov

Language: English - Date: 2013-07-15 08:23:03
384Environment / Normalized Difference Vegetation Index / Wetland / Geographic information system / Moderate-Resolution Imaging Spectroradiometer / EVI / Earth observation / Environmental monitoring / Global Earth Observation System of Systems / Earth / Remote sensing / Computer vision

On the Contribution of Remote Sensing to DOPA, a Digital Observatory for Protected Areas. Dubois* G, Clerici M, Pekel JF, Brink A, Palumbo I, Gross D, Peedell S, Simonetti D, Punga M European Commission, Joint Research C

Add to Reading List

Source URL: dopa.jrc.ec.europa.eu

Language: English - Date: 2011-07-16 11:06:57
385Data / Wireless security / IEEE 802.1X / SCADA / Wi-Fi Protected Access / IPsec / IEEE 802.11i-2004 / Computer security / Deep packet inspection / Computer network security / Computing / Cyberwarfare

Capabilities and technical Overview EnergyGuard Appliance 3e–723A Today, federal agencies and industries are seeking innovative, cost-effective

Add to Reading List

Source URL: www.ultra-3eti.com

Language: English - Date: 2014-05-29 15:43:21
386Wireless networking / Organizational behavior / Computer network security / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Supervisor / Management / Occupational safety and health

July[removed]EAP Consultants, LLC[removed]

Add to Reading List

Source URL: www.usgs.gov

Language: English - Date: 2014-07-02 14:15:30
387Security / Law / Health Insurance Portability and Accountability Act / Computer security / Data security / Information privacy / Information security / Protected health information / Internet privacy / Ethics / Privacy / Data privacy

HIPAA Privacy and Security Overview 1 HIPAA Privacy and Security Overview

Add to Reading List

Source URL: www.tricare.mil

Language: English - Date: 2010-06-15 18:47:38
388Computing / Technology / Electronic engineering / Lantronix / Wireless security / IEEE 802.11 / Protected Extensible Authentication Protocol / IEEE 802.1X / Wireless access point / Computer network security / Wireless networking / Wi-Fi

PremierWave EN Embedded Linux Medical Wireless Device Server

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2013-07-11 20:03:01
389Criminal law / 98th United States Congress / Computer Fraud and Abuse Act / Hacking / Cybercrime / Computing / Protected computer / Authorization / Mail and wire fraud / Computer law / Information technology audit / Law

FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant,

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2012-04-10 15:09:01
390Computing / IEEE 802.11 / Technology / Wireless / Wi-Fi / Wi-Fi Protected Access / Wireless security / Wireless access point / Wi-Fi Protected Setup / Computer network security / Wireless networking / Cryptographic protocols

Old Dominion University Computer Science Department Policies and Procedures Title: Wireless Access ID: CSW001 Revision: 1.0 Purpose

Add to Reading List

Source URL: www.cs.odu.edu

Language: English - Date: 2014-01-11 21:50:40
UPDATE