Protected computer

Results: 695



#Item
621Privacy / Data privacy / Crime prevention / Computer law / Data Protection Act / Telecommunications data retention / Mass surveillance / Surveillance / Data Protection Directive / Security / Ethics / Law

NINE PRINCIPLES FOR ASSESSING WHETHER PRIVACY IS PROTECTED IN A SURVEILLANCE SOCIETY. Dr. C. N. M. Pounder [removed] The original publication was published in “Identity in the Information Society”

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2010-09-10 12:26:27
622Privacy law / Data privacy / Health Insurance Portability and Accountability Act / International standards / Computer security / Data security / Electronic health record / Privacy / Protected health information / Health / Ethics / Medicine

Microsoft Word - 18905877_2.DOC

Add to Reading List

Source URL: www.txhima.org

Language: English - Date: 2013-09-01 17:50:25
623Crimes / Theft / Cybercrime / Legal terms / Mail and wire fraud / Making false statements / Protected computer / Authentication / Title 18 of the United States Code / Law / Criminal law / Computer law

CYBERCRIME LAWS OF THE UNITED STATES

Add to Reading List

Source URL: www.oas.org

Language: English - Date: 2007-10-15 16:46:54
624Wi-Fi / Electronic engineering / Wireless networking / IEEE 802.1X / Wireless access point / IEEE 802.11 / Electronics / Wi-Fi Protected Access / Wireless security / Computer network security / Computing / Cryptographic protocols

VT2210_Datasheet_June2011_jb.ai

Add to Reading List

Source URL: www.vivato.com

Language: English - Date: 2011-08-19 22:40:04
625Physics / Quantum error correction / Toric code / Quantum computer / Qubit / Quantum decoherence / Topological quantum computer / Quantum gate / Quantum superposition / Quantum information science / Theoretical computer science / Quantum mechanics

Physical implementation of protected qubits B Dou¸cot1 and L B Ioffe2 ´ 1 Laboratoire de Physique Th´eorique et Hautes Energies, CNRS UMR 7589 et Universit´e Paris 6, Boˆıte 126, 4 place Jussieu, 75252 Paris Cedex

Add to Reading List

Source URL: echidna.rutgers.edu

Language: English - Date: 2012-01-13 08:46:48
626Law / Mail and wire fraud / Protected computer / Criminal law / CAN-SPAM Act / Computing / Computer law / Cybercrime / Computer network security

Unlawful Online Conduct and Applicable Federal Laws As of[removed]The chart below details the type of unlawful online conduct, potentially applicable federal laws, and the section of the Department of Justice with subje

Add to Reading List

Source URL: www.misd.org

Language: English - Date: 2012-07-20 12:02:28
627Windows Vista / Electronic engineering / Television technology / Video signal / Digital rights management / Protected Media Path / High-bandwidth Digital Content Protection / HDMI / Bus encryption / Computer hardware / Microsoft Windows / High-definition television

Output Content Protection and Windows Vista - 1 Output Content Protection and Windows Vista - 1 Output Content Protection and Windows Vista

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-04-05 17:08:47
628Fiber-optic communications / Theoretical computer science / Technology / Routing / Wavelength-division multiplexing / Shortest path problem / Optical fiber / Optical mesh network / Routing and wavelength assignment / Telecommunications / Network architecture / Multiplexing

♦ SPIDER: A Simple and Flexible Tool for Design and Provisioning of Protected Lightpaths in Optical Networks R. Drew Davis, Krishnan Kumaran, Gang Liu, and Iraj Saniee Optical devices are poised to form the core of the

Add to Reading List

Source URL: cm.bell-labs.com

Language: English - Date: 2001-08-08 20:52:10
629Crime prevention / Cryptography / Cyberwarfare / Information security / Bruce Schneier / Security engineering / Computer security / Smart card / Burglar alarm / Security / National security / Safety

Preface For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs rang

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 09:45:30
630IEEE 802.11 / Computing / Technology / Cyberwarfare / Wi-Fi Protected Access / Wi-Fi / Wireless security / Wired Equivalent Privacy / Temporal Key Integrity Protocol / Cryptographic protocols / Computer network security / Wireless networking

Annales Mathematicae et Informaticae[removed]pp. 45–55 http://ami.ektf.hu Performance evaluation of wireless networks speed depending on the

Add to Reading List

Source URL: ami.ektf.hu

Language: English - Date: 2013-12-20 14:05:43
UPDATE