Protected computer

Results: 695



#Item
571Computer network security / Wireless / IEEE 802.11 / Computing / Wireless security / Wireless access point / Wireless LAN / Wi-Fi Protected Access / Service set / Wireless networking / Cryptographic protocols / Technology

PDF Document

Add to Reading List

Source URL: ita.idaho.gov

Language: English - Date: 2013-05-29 12:05:00
572Malware / 105th United States Congress / Copyright law / Digital rights management / Computer network security / SecuROM / Digital Millennium Copyright Act / Rootkit / Sony BMG copy protection rootkit scandal / Computer security / Cyberwarfare / Law

[Proposed class or classes of copyrighted work(s) to be exempted]= Class 1: Literary works, sound recordings, and audiovisual works accessible on personal computers and protected by technological protection measures that

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2008-12-03 09:57:10
573Identity management / Credential / Computer Misuse Act / Computing / Electronics / Law / Computer network security / Extranet / Network architecture

Information and Communication Technologies Division Extranets: Interim Procedure for Providing Access to Non-members of the College Definition: An extranet is defined here as a protected area of the College web site to w

Add to Reading List

Source URL: www3.imperial.ac.uk

Language: English
574Computer security / Information sensitivity

SNAP Classification and Anonymisation System Category UNPROTECTED PROTECTED

Add to Reading List

Source URL: www.acaps.org

Language: English - Date: 2014-03-18 08:24:26
575Cybercrime / Protected computer / United States Code / Government / Information technology audit / National Information Infrastructure Protection Act / Computer law / Law / Computer network security

18 USC 1030 NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 47 - FRAU

Add to Reading List

Source URL: www.missingkids.com

Language: English - Date: 2013-02-22 22:55:27
576Cryptographic protocols / IEEE 802.11 / Technology / Computing / Wireless security / Wireless access point / Aircrack-ng / Lightweight Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless networking / Cryptography / Computer network security

Operations Team Admin Advisory-003 Cipher suite selection for eduroam Service Providers

Add to Reading List

Source URL: www.eduroam.org

Language: English - Date: 2009-02-05 07:56:34
577Protected computer / Law / Computer law / Computer network security / Cybercrime

2003 Sentencing Guidelines Manual

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:23:34
578Protected computer / Law / Computer law / Computer network security / Cybercrime

November 1, 2006 APPENDIX A GUIDELINES MANUAL

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:23:20
579Protected computer / Law / Computer law / Computer network security / Cybercrime

2001 Federal Sentencing Guidelines Manuals

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:23:26
580Protected computer / Law / Computer law / Computer network security / Cybercrime

2009 Sentencing Guidelines Manual

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:22:34
UPDATE