Public computer

Results: 14618



#Item
481Interoperability / Electronics / Technology / Trunked radio systems / APCO / IJIS Institute / Computer-aided dispatch

Unified Computer-Aided Dispatch Functional Requirements (UCADFR): Its Use and Future May 22, 2012 Bill Hobgood, Project Manager, City of Richmond, DIT Public Safety Team  & Project Coordinator, APCO Intern

Add to Reading List

Source URL: www.theiacp.org

Language: English - Date: 2013-12-17 12:24:19
482Vector graphics markup languages / MetaPost / PostScript / Public domain software / Donald Knuth / Digital typography / Metafont / TeX / Pic language / Computing / Software / Computer graphics

The MetaPost System John D. Hobby June 28, 1995 Abstract

Add to Reading List

Source URL: ntg.nl

Language: English - Date: 1998-01-29 15:13:23
483Computing / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Resource Public Key Infrastructure / Autonomous system / IP hijacking / Path vector protocol / Network architecture / Internet / Routing protocols

BGP Route Leaks Analysis Benjamin Wijchers Faculty of Exact Sciences, department of Computer Science Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2014-12-04 08:33:22
484Computing / Protection Profile / Key management / Public-key cryptography / Common Criteria / Electronic signature / Evaluation Assurance Level / Public key certificate / Integrity / Computer security / Evaluation / Security

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
485Computer-mediated communication / Teleconferencing / Computer telephony integration / VoIP phone / Voice over IP / Business telephone system / Public switched telephone network / Session border controller / Videoconferencing / Telephony / Videotelephony / Electronic engineering

Bridging Audio Into A Video Conference EdgeProtect - Enterprise Session Border Controller Edgewater Networks’ EdgeProtect Series enterprise session border controllers (ESBCs) are used by customers of all sizes to deplo

Add to Reading List

Source URL: uk.ucc.westcon.com

Language: English
486Public-key cryptography / Computer security / Antivirus software / Phishing / Whitelist / Blacklist / Public key certificate / Certificate authority / HTTP Secure / Cryptography / Spamming / Key management

C:/Users/zhdong/Dropbox/Papers/ACSAC Poster/Certs_file.dvi

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2015-01-23 15:36:26
487C++ / Software design patterns / Const-correctness / C Sharp syntax / Computer programming / Computing / Software engineering

C# /** **/ public class ParkingLot

Add to Reading List

Source URL: cse.proj.ac.il

Language: English - Date: 2007-05-15 18:00:32
488System software / Identity / Federated identity / Security Assertion Markup Language / Shibboleth / SAML 2.0 / Service provider / Federated identity management / Public key certificate / Identity management systems / Identity management / Computer security

KALMAR UNION, FEDERATIONS A CONFEDERATION

Add to Reading List

Source URL: wayf.dk

Language: English - Date: 2012-04-24 07:15:37
489Computer network security / Crime prevention / National security / Traveller / Security awareness / Public safety / Security / Games / Computer security

A GROUND-BREAKING NEW TRAINING tool INTERACTIVE LEARNING FOR SAFER BUSINESS TRAVEL TEACHING YOUR EMPLOYEES

Add to Reading List

Source URL: www.riskadvisory.net

Language: English - Date: 2008-08-22 03:35:00
490Evaluation / Public-key cryptography / FIPS 140-2 / Electronic signature / Common Criteria / Protection Profile / Digital signature / Backup / Cryptography / Computer security / CEN Workshop Agreement

Microsoft Word - CWA14167-2_with_backup_CMCSOB-PP_v028.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:34
UPDATE