Public computer

Results: 14618



#Item
251Public-key cryptography / Key management / Simple public-key infrastructure / Authorization certificate / Public key infrastructure / X.509 / Public key certificate / MD5 / Digital signature / NP / RSA

Journal of Computer Security–322 IOS Press 285 Certificate chain discovery in SPKI/SDSI

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2016-07-18 22:33:05
252Soviet Nonconformist Art / Christo and Jeanne-Claude / Art movements / Contemporary art / The Gates / Ilya Kabakov / Alice Aycock / Installation art / Public art

Beyond the Museum: An Artistic Blueprint for Social and Disciplinary Change Donna A. Buchanan Jonathan Fineberg is the Gutgsell Professor of Art History (1984– ) and a Visiting Professor of Computer Science (2005– ).

Add to Reading List

Source URL: www.reeec.illinois.edu

Language: English - Date: 2009-05-07 14:28:01
253Computer security / Data security / Crime prevention / Security / Common Criteria / Protection Profile / Public key certificate / Evaluation Assurance Level / Validation / Evaluation / Information security / Professional certification

ARRANGEMENT on the Recognition of Common Criteria Certificates In the field of

Add to Reading List

Source URL: www.tuv-nederland.nl

Language: English - Date: 2015-05-12 02:55:23
254Free software / Software licenses / Computer law / Standards / Strategic management / Open-source software / Proprietary software / Open-source model / Free and open-source software / Open standard / Business models for open-source software / GNU General Public License

Why Open Software Matters for Government & Civic Tech [and how to support it] by Rufus Pollock1

Add to Reading List

Source URL: rufuspollock.org

Language: English - Date: 2016-07-13 08:00:38
255Software licenses / Computer law / Cross-platform software / Free software / Criticism of intellectual property / Drupal / Proprietary software / Open-source movement / GNU General Public License / Software / Open-source software / Student information system

MYEAP II An investigation of alternative technologies for building the next version of the UCEAP Student Information System Prepared by Thomas A. Bunnell

Add to Reading List

Source URL: uceapcon.files.wordpress.com

Language: English - Date: 2016-06-30 11:48:02
256Visualization / Infographics / Computational science / Computer graphics / Data visualization / Information technology governance / Jock D. Mackinlay / VisIt / Data analysis / Visual analytics / Panopticon Software / Data-driven journalism

Public Data and Visualizations: How are Many Eyes and Tableau Public Used for Collaborative Analytics? Kristi Morton1 , Magdalena Balazinska1 , Dan Grossman1 , Robert Kosara2 , and Jock Mackinlay2 1 University

Add to Reading List

Source URL: kosara.net

Language: English - Date: 2015-10-05 00:14:15
257Kiwanis / Kids / Computer chess / Crafty

Children who read over the summer do better in school than children who don’t. Incorporating reading into your child’s summer in a fun way is easy to do at the Spirit Lake Public Library. Children from infants throug

Add to Reading List

Source URL: slpublib.weebly.com

Language: English - Date: 2016-06-02 16:43:13
258Formal methods / University of Toronto / Theoretical computer science / Eric Hehner / Program derivation / Predicative programming / Refinement / Formal verification / Department of Computer Science

Lai, Albert Yu Cheong Curriculum Vitae (address and phone omitted in public) email: trebla [at] vex [dot] net Born in 1969 Citizenship: Canadian

Add to Reading List

Source URL: www.vex.net

Language: English - Date: 2014-07-22 17:29:12
259Library card / Internet / Public library / Sumter County Library /  FL

Microsoft Word - Computer rules_rev_012010.doc

Add to Reading List

Source URL: www.scpl.org

Language: English - Date: 2016-04-19 10:47:16
260Cloud storage / Cryptography / Cloud computing / Cloud infrastructure / Data security / Peer-to-peer / Internet privacy / Public-key cryptography / Secret sharing / Computer security / Key management / Distributed file system for cloud

A Comprehensive Security Model for Networking Applications

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2012-09-05 17:42:27
UPDATE