Protected computer

Results: 695



#Item
51Computer Fraud and Abuse Act / United States v. Lori Drew / Stored Communications Act / Protected computer / Fourth Amendment to the United States Constitution / Amicus curiae / Computer law / Law / Criminal law

__________________________________ No__________________________________ IN THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2011-10-06 17:37:47
52Computing / Wi-Fi / Electronic engineering / Wireless access points / IEEE 802.1X / Hotspot / Wireless LAN / Protected Extensible Authentication Protocol / IEEE 802.11 / Wireless networking / Computer network security / Technology

Anyfi Networks Carrier Wi-Fi System BASIC SDWN CORE

Add to Reading List

Source URL: www.anyfinetworks.com

Language: English - Date: 2015-06-22 11:17:44
53Patent law / Open content / Computer law / Copyleft / Free software licenses / License / Royalties / Creative Commons license / Copyright / Law / Intellectual property law / Civil law

Creative Commons Attribution-NoDerivs CC BY-ND Licence THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHE

Add to Reading List

Source URL: digital-library.theiet.org

Language: English - Date: 2013-03-13 09:34:15
54Assembly languages / Instruction set architectures / Addressing mode / Machine code / ARM architecture / Processor register / GNU Compiler Collection / Pointer / Protected mode / Computing / Computer architecture / Software

Addressing Mode Selection in GCC Naveen Sharma HCL Technologies Ltd. Rakesh Kumar HCL Technologies Ltd.

Add to Reading List

Source URL: gcc.cybermirror.org

Language: English - Date: 2004-08-29 18:00:00
55SPOT / Spot Image / Geography / Bezenchuksky District / Remote sensing / Samara / Computer vision / Earth / Samara /  Russia

Satellite-Based Monitoring of Protected Natural Areas of the Samara Region By V.V. Sergeev1, A.V. Chernov2, O.A. Belova3 Key words: protected natural areas, remote sensing data, monitoring, change detection

Add to Reading List

Source URL: www.zikj.ru

Language: English - Date: 2013-10-15 05:32:03
56Cybercrime / Protected computer / Appeal / Cioni / Law / Computer law / Computer network security

Case: Document: 88 Date Filed:

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2011-10-06 17:37:47
57Construction / Architecture / Computer-aided design / Technology / Data modeling / ETS-Lindgren / Electromagnetic shielding / Bim / Electromagnetic pulse / Building information modeling / Electromagnetic compatibility / Electromagnetic radiation

A private regional corporation with numerous Fortune 1,000 clients decided to develop an original 16,723 m2 (180,000 ft2) command-and-control operations center with over 9,290 m2 (100,000 ft2) of surface area protected a

Add to Reading List

Source URL: www.ets-lindgren.com

Language: English - Date: 2015-05-07 15:31:54
58Networking hardware / Computer networking / Packet Processing / Latency / Transmission Control Protocol / Thread / Kernel / Scheduling / Firewall / Computing / System software / Software

IX: A Protected Dataplane Operating System for High Throughput and Low Latency Adam Belay, Stanford University; George Prekas, École Polytechnique Fédérale de Lausanne (EPFL); Ana Klimovic, Samuel Grossman, and Christ

Add to Reading List

Source URL: www.usenix.org

Language: English
59Desktop publishing software / Digital typography / Donald Knuth / TeX / Typesetting / DOS Protected Mode Interface / Device independent file format / EXE / DOS / Computing / Software / Computer architecture

160 Some notes about TEX and MS-Windows Bijlage B

Add to Reading List

Source URL: www.ntg.nl

Language: English - Date: 1993-09-30 20:27:20
60Assembly languages / Central processing unit / X86 architecture / Addressing mode / Memory address / X86 / Pointer / Processor register / Protected mode / Computer architecture / Computing / Instruction set architectures

Architectural Issues < PAGE >1Chapter XX: Architectural Issues $Revision: 2.3 $ $Date: :30:36 $ Linkers and loaders, along with compilers and assemblers, are exquisitely sensitive to the architectural deta

Add to Reading List

Source URL: www.iecc.com

Language: English - Date: 1999-06-14 23:31:34
UPDATE