Protected computer

Results: 695



#Item
501Computer law / United States Federal Sentencing Guidelines / United States federal law / Theft / Identity theft / Attendant circumstance / Protected computer / Title 18 of the United States Code / National Information Infrastructure Protection Act / Law / Criminal law / Crimes

Proposed Amendments to the Sentencing Guidelines January 27, 2009 This compilation contains unofficial text of proposed amendments to the sentencing guidelines

Add to Reading List

Source URL: www.ussc.gov.

Language: English - Date: 2014-01-08 18:20:34
502Interrupts / X86 architecture / Central processing unit / Protected mode / Computer errors / X86 memory segmentation / Real mode / Control register / Interrupt vector table / Computer architecture / Computing / Programming language implementation

Protected Mode Basics By Robert Collins I remember when I was first learning protected mode. I had barely taught myself assembly language, and I got this crazy idea that I wanted to teach myself protected mode. I went ou

Add to Reading List

Source URL: www.lucianoaibar.com

Language: English - Date: 2011-10-31 23:36:29
503System software / Windows Server / PKWARE /  Inc / PKZIP / Zip / Ubuntu / ARC / Windows / Archive formats / Software / Computer architecture

DATASHEET: SECUREZIP FOR SERVER Protect data exchange and archiving processes Files that contain sensitive data, whether stored or being transmitted, need to be protected. SecureZIP® makes securing these files an effor

Add to Reading List

Source URL: www.pkware.com

Language: English - Date: 2014-07-07 13:05:09
504Computer law / Politics of the United Kingdom / Broadband / Voice over IP / Intellectual property / Hargreaves Review of Intellectual Property and Growth / PRO-IP Act / Intellectual property law / Law / United Kingdom copyright law

IP Update Summer 2014 Our Vision for IP knowledge that their IP is properly recognised and protected.

Add to Reading List

Source URL: www.allianceagainstiptheft.co.uk

Language: English - Date: 2014-07-25 05:51:49
505Software / Zimbra / Internet Message Access Protocol / Push email / Comparison of email clients / Email / Computer-mediated communication / Computing

Zimbra Web Client User Guide Advanced Web Client Release 7.2 Legal Notices Copyright ©[removed]VMware, Inc. All rights reserved. This product is protected by U.S. and

Add to Reading List

Source URL: pantherfile.uwm.edu

Language: English - Date: 2013-07-12 15:04:38
506Wireless networking / IEEE 802.11 / System software / Wi-Fi Protected Access / Wi-Fi / Ifconfig / Wireless access point / Wicd / Wireless security / Computer network security / Computing / Software

Microsoft Word - Raspberry Pi wireless adapter.docx

Add to Reading List

Source URL: elinux.org

Language: English - Date: 2012-11-01 14:36:35
507Geographic information systems / Earth / Cartography / Earth sciences / Global Earth Observation System of Systems / Group on Earth Observations / Global Biodiversity Information Facility / Remote sensing / Computer vision / Geography

A Digital Observatory for Protected Areas - DOPA, a GEO-BON contribution to the monitoring of African biodiversity DUBOIS Grégoire, CLERICI Marco, PEEDELL Stephen, MAYAUX BARTHOLOME Etienne, GREGOIRE Jean-Marie Philipp

Add to Reading List

Source URL: earthobservations.org

Language: English - Date: 2011-10-10 09:34:31
508Law / Human rights / Computer law / Data Protection Directive / Information privacy / Internet privacy / Personally identifiable information / P3P / Data Protection Act / Ethics / Privacy / Data privacy

Electronic Journal of Comparative Law, vol[removed]October 2004), THE PROPERTIZATION OF PERSONAL DATA AND IDENTITIES J.E.J. Prins1 Readers are reminded that this work is protected by copyright. Whi

Add to Reading List

Source URL: www.ejcl.org

Language: English - Date: 2014-01-15 11:21:32
509Computing / Wireless / Wireless security / Protected Extensible Authentication Protocol / Wi-Fi / Wireless LAN / Comparison of wireless LAN clients / Wpa supplicant / Wireless networking / Computer network security / Technology

PDF Document

Add to Reading List

Source URL: www.gov.hk

Language: English - Date: 2010-02-07 08:35:44
510Computer network security / Software / Wireless networking / Password / Protected Extensible Authentication Protocol / Wi-Fi / Windows / Features new to Windows XP / Wireless security / Microsoft Windows / Computing / Windows Server

PDF Document

Add to Reading List

Source URL: www.gov.hk

Language: English - Date: 2010-02-07 08:35:44
UPDATE