Public computer

Results: 14618



#Item
341Security / Safety / Prevention / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: www.txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
342Public Library Association / Advertising / Pixel / Public Libraries / Bleed / Computer graphics / Design / Imaging

Advertising Contract the official magazine of the public library association Our print magazine deals with current issues and trends in public libraries and is rated one of the highest benefits of PLA membership, accordi

Add to Reading List

Source URL: www.placonference.org

Language: English - Date: 2016-02-02 02:27:44
343Software licenses / Concurrent user / Copyleft / Free and open-source software licenses / Public copyright licenses / Computer law

Typing Quest price list This price list is valid until July 31st, 2017. Prices in US dollar. Prices for K-8 Schools Payment Options and Purchase Orders

Add to Reading List

Source URL: www.typingquest.com

Language: English - Date: 2016-04-07 04:55:21
344Computing / Cryptography / Security / E-commerce / Mobile security / Bluetooth / Copyright law of the United States / Copyright / Public key infrastructure / Computer security

Mobile Application Security David Vo (Dvo) Dec 15, 2015 Copyright © 2015 nVisium LLC · www.nvisium.com

Add to Reading List

Source URL: nvisium.com

Language: English - Date: 2015-12-17 16:41:53
345

Lecture #10: Sequences Public Service Announcement “Align is a new student organization on campus that hopes to unite undergraduate students across the disciplines of biology, computer science, applied math, and stati

Add to Reading List

Source URL: cs61a.org

Language: English - Date: 2016-04-16 22:38:25
    346European culture / Computing / Cultural policies of the European Union / Digital media / Digital art / Computer law / Intellectual property law / Public sphere / Europeana / Digital Public Library of America / Open content / Open-source model

    EUROPEANA SPACE   Deliverable: D3.2/4  Title: Europeana Space: Final Report on the Content Space and Legal Aspects    

    Add to Reading List

    Source URL: openglam.org

    Language: English - Date: 2016-04-06 11:58:34
    347

    “Add Another Blue Stack of the Same Height!”: ASP Based Planning and Plan Failure Analysis Chitta Baral1 and Tran Cao Son2 1 Department of Computer Science and Engineering, Arizona State University, Tempe, AZ

    Add to Reading List

    Source URL: www.public.asu.edu

    Language: English - Date: 2015-08-15 11:27:42
      348Software licenses / Computer law / Free and open-source software licenses / Free software / Proprietary software / End-user license agreement / Software / License / Open-source software / GNU General Public License / Software patent

      FME® SOFTWARE LICENSE AGREEMENT IMPORTANT – READ CAREFULLY: This FME Software License Agreement ("Agreement") is a legal agreement between You (either an individual or a single legal entity) and Safe Software Inc. ("S

      Add to Reading List

      Source URL: cdn.safe.com

      Language: English - Date: 2016-01-07 11:51:06
      349Natural language processing / Temporal information retrieval / Information retrieval / Word-sense disambiguation

      Disambiguating Implicit Temporal Queries for Temporal Information Retrieval Applications PhD in Computer Science Public Defense

      Add to Reading List

      Source URL: www.ccc.ipt.pt

      Language: English - Date: 2013-06-12 22:53:10
      350Certificate authorities / Computer access control / Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Authentication / Digital identity / Society for Worldwide Interbank Financial Telecommunication / IdenTrust / Identity theft / Entrust

      i2i Karen Wendel Karen Wendel has more than 20 years of experience in financial services, applications development

      Add to Reading List

      Source URL: www.identrust.com

      Language: English - Date: 2012-07-10 20:41:43
      UPDATE