Public computer

Results: 14618



#Item
461Criminal law / 98th United States Congress / Computer Fraud and Abuse Act / Hacking / Information technology audit / Clickwrap / CFAA / Browse wrap / Copyright law of the United States / Computer law / Software licenses / Law

“ACCESS GRANTED: The Necessity of a Presumption of Public Access under the CFAA and Beyond.” Christine S. Davik University of Maine School of Law Recently, there has been a significant increase in attempts to use th

Add to Reading List

Source URL: conferences.asucollegeoflaw.com

Language: English - Date: 2015-03-05 16:29:11
462Computer security / Auditing / Medeco / Roanoke County /  Virginia / Access control / Assa Abloy / Information technology security audit / Key / Security / Public safety / Locksmithing

1 eCylinders are uniquely designed to solve the often overlooked security vulnerabilities in today’s educational environments Protect Confidential Student Records

Add to Reading List

Source URL: www.medeco.com

Language: English - Date: 2013-03-27 10:32:19
463Patent law / Open content / Computer law / Copyleft / Free software licenses / License / Royalties / Creative Commons license / Copyright / Law / Intellectual property law / Civil law

Creative Commons Attribution-NoDerivs CC BY-ND Licence THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CREATIVE COMMONS PUBLIC LICENSE ("CCPL" OR "LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHE

Add to Reading List

Source URL: digital-library.theiet.org

Language: English - Date: 2013-03-13 09:34:15
464Public safety / Computer security / Actuarial science / Risk management / Business continuity / Information security management system / Information security / Emergency management / Risk assessment / Management / Security / Data security

Microsoft PowerPoint - ENISA FORTH Summer School Business Continuity Presentation v1.0.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:07
465Public-key cryptography / Modular arithmetic / Computer arithmetic / Electronic commerce / RSA / Modular exponentiation / Montgomery reduction / Exponentiation by squaring / Eternity II puzzle / Cryptography / Mathematics / Abstract algebra

Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

Add to Reading List

Source URL: wwwcn.cs.uni-duesseldorf.de

Language: English - Date: 2014-01-09 02:12:40
466Microsoft BASIC / Email / Visual Basic / BASIC / Homework / Internet / Microsoft Visual Studio / Subroutine / Assignment / Computing / Computer programming / Software engineering

California State University Dominguez Hills College of Business and Public Administration CIS 272 Business Programming I Fall 2006 Section 1: 10::15 am WH C155 Section 2: M 7:00 - 9:45 pm WH C155

Add to Reading List

Source URL: som.csudh.edu

Language: English - Date: 2006-08-25 17:05:04
467Cyberwarfare / Data security / Software testing / National security / Information security / Vulnerability / Information Systems Security Association / Application security / Business ethics / Security / Computer security / Computer network security

Ethics and Privacy ISSA Journal | October 2009 INSERT Ethics INTO Public Web App Testing By Michael Starks – ISSA member, Fort Worth, USA Chapter

Add to Reading List

Source URL: www.immutablesecurity.com

Language: English - Date: 2011-11-05 20:01:53
468Computer law / Privacy law / Electronic Signatures in Global and National Commerce Act / Digital signature / Negotiable Instruments Act / Public key certificate / Electronic signature / Uniform Electronic Transactions Act / Cryptography / Key management / Public-key cryptography

MINISTRY OF LAW, JUSTICE AND COMPANY AFFAIRS (Legislative Department) New Delhi, the 9th June, 2000/Jyaistha 19, 1922 (Saka) The following Act of Parliament received the assent of the President on the 9th June, 2000, an

Add to Reading List

Source URL: www.nia.gov.in

Language: English - Date: 2013-01-08 08:43:31
469Technology / Computing / Nanonetwork / Network architecture / Telecommunications / Key management / Public-key cryptography / Cryptography / Nanorobotics / Software / Nanotechnology / Emerging technologies

Towards Security in Nano-communication: Challenges and Opportunities Falko Dressler∗,a , Frank Karglb,c a Computer and Communication Systems, University of Innsbruck, Austria b Distributed Systems, University of Ulm, G

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2013-01-06 11:36:19
470National security / Computer security / HMS Impregnable / Public safety / Doors / Security / Crime prevention

Security & great design from Impregnable Securty. Our range of security doors cover all needs, from very cheap simple

Add to Reading List

Source URL: www.impregnablesecurity.co.uk

Language: English - Date: 2014-06-24 19:26:16
UPDATE