Public computer

Results: 14618



#Item
211Cloud computing / Cloud storage / Cloud infrastructure / Cloud computing security / Computer security / Cloud applications / Public-key cryptography / Encryption / Crypto cloud computing / Perspecsys

nternational Journal & Magazine of Engineering, Technology, Management and Research Volume 1, Issue 10, October

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:18
212Digital typography / Typesetting / Computer law / Free and open-source software licenses / Graphic design / Web typography / Typeface / End-user license agreement / Font / License / Software license / GNU General Public License

Brownfox Brownfox Web End-user License Agreement IMPORTANT! Please read the contents of this Licensing Agreement carefully before you install

Add to Reading List

Source URL: brownfox.org

Language: English - Date: 2016-02-01 16:23:56
213Crime prevention / Cryptography / Information governance / National security / Computer security / Privacy / Internet privacy / Gene Spafford / Information security / Association for Computing Machinery / Barbara Simons

Association for Computing Machinery (ACM) ACM US Public Policy Council (USACM) usacm.acm.org facebook.com/usacm twitter.com/usacm

Add to Reading List

Source URL: usacm.acm.org

Language: English - Date: 2015-12-04 20:11:48
214Software licenses / Free software / Computer law / Proprietary software / Open-source software / Software / Free and open-source software / Commercial software / License / Copyleft / GNU General Public License

FOSS Free and Open Source Software What is the Free and Open Source Software It is mentioned that GIS, QGIS, GeoNetwork, and others

Add to Reading List

Source URL: www.cp-idea.org

Language: English - Date: 2016-05-09 13:55:49
215Crime prevention / Cryptography / Information governance / National security / E-commerce / Data management / Information security / Computer security / Information privacy / Public key certificate

Information Technology Procedures CCC Data Users Procedures Identifier: IT-PROC-AT – 003 Revision Date:

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-12-11 15:46:29
216Library science / Humanities / Public library / SirsiDynix

Executive Director, Cooperative Computer Services Provide leadership and support to 24 progressive public libraries in the north and northwest Chicago suburbs as the new Executive Director of Cooperative Computer Service

Add to Reading List

Source URL: mpla.us

Language: English
217National security / Public housing in the United States / United States Department of Housing and Urban Development / Urban planning in the United States / Computer security / HUD

Rules of Behavior for Use of Enterprise Income Verification (EIV) Information (for Individuals without Access to the EIV System) The Department of Housing and Urban Development’s EIV system contains sensitive data obta

Add to Reading List

Source URL: www.hud.gov

Language: English - Date: 2009-09-17 14:29:44
218Surveying / Real estate / Geographic information systems / Cadastre / Land information system / Geodetic control network / National Research Council / Survey / Public Land Survey System / Boundary / Land survey

ALTERNATIVE ROUTES TO A MULTIPURPOSE CADASTRE: MERGING INSTITUTIONAL AND TECHNICAL REASONING Nicholas R. Chrisman and Bernard J. Niemann, Jr. Land Information and Computer Graphics Facility Department of Landscape Archit

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-29 23:58:25
219Identification / Biometrics / National security / Social Security number / Taxation in the United States / Fingerprint / Airport security / Transportation Security Administration / United States Department of Homeland Security / Public key fingerprint / Computer security

Renewal Form PRINT OR TYPE all information before returning this form to Airport Operations. Last Name ________________ First Name ________________ Middle Name _________________ Suffix ___ Social Security Number ________

Add to Reading List

Source URL: www.flygpt.com

Language: English - Date: 2015-07-16 17:26:14
220Computer network security / Cybercrime / National security / Computer security / Cryptography / Threat

INNOVATION AND TECHNOLOY FUND Post Project Evaluation Form for ITSP Projects Undertaken by Designated Local Public Research Institute Notes for Completion This evaluation form comprises two parts which should be complet

Add to Reading List

Source URL: www.itf.gov.hk

Language: English - Date: 2016-06-23 05:47:04
UPDATE