Public computer

Results: 14618



#Item
561Privacy / Computer security / Data security / Information privacy / Information security / Data Protection Directive / Binding corporate rules / Public safety / Privacy law / Data privacy / Security

Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document

Add to Reading List

Source URL: www.kvaerner.com

Language: English - Date: 2012-04-20 04:15:58
562Open government / Digital media / Public administration / Literacy / Intel / Computer literacy / E-Government / Global digital divide / Information and communication technologies for development / Technology / Digital divide / Computing

Closing Europe’s digital divide A report from the Economist Intelligence Unit Intel_Cover.indd 2

Add to Reading List

Source URL: www.elektronika.lt

Language: English - Date: 2008-12-23 08:43:38
563National security / Government / Computer security / Homeland Security Advisory System / Public safety / United States Department of Homeland Security / Security

SCENARIO 3- Roger the maintenance man at the hydro dam

Add to Reading List

Source URL: www.kyield.com

Language: English - Date: 2015-05-01 19:32:48
564Cryptographic protocols / Computer security / Internet standards / Secure communication / Transport Layer Security / Jericho Forum / De-perimeterisation / Advanced Encryption Standard / Public-key cryptography / Cryptography / Data security / Security

Microsoft Word - Contents Thesis 1.10.doc

Add to Reading List

Source URL: www.few.vu.nl

Language: English - Date: 2015-06-15 16:32:20
565Electronics / Network access / Videotelephony / Computer telephony integration / Public switched telephone network / Business telephone system / Län / Electronic engineering / Telephony / Integrated Services Digital Network

Municipality Identity Code Plan

Add to Reading List

Source URL: www.pts.se

Language: English - Date: 2012-11-15 09:02:44
566Application software / Computer graphics / Vector graphics markup languages / Public domain software / MetaPost / PostScript / Bézier curve / TeX / Metafont / Computing / Splines / Donald Knuth

TEX beauties and oddities A permanent call for TEX pearls What is wanted: . short TEX or METAPOST macro/macros (A4 page or a screen at most), . the code should be generic; potentially understandable by plain-oriented use

Add to Reading List

Source URL: www.gust.org.pl

Language: English - Date: 2011-05-19 13:50:04
567Computer crimes / Computer network security / Computer security / Secure communication / Critical infrastructure protection / Computer emergency response team / National Cyber Security Division / Cyber-security regulation / National security / Security / United States Department of Homeland Security

COUNTRY: CROATIA Croatia has yet to establish a comprehensive cybersecurity strategy or a well-developed system of public-private partnerships. Croatia has two established computer emergency response teams (CERTs). The N

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:14:54
568Open content / Free content / Open source movement / Open source / Open-source software / Proprietary software / GNU General Public License / Free software / Open-source license / Software licenses / Computer law / Law

c Lucius & Lucius, Stuttgart) p. 279–301 Analyse & KritikMargit Osterloh/Sandra Rota Trust and Community in Open Source

Add to Reading List

Source URL: www.analyse-und-kritik.net

Language: English
569Block cipher modes of operation / Block cipher / Ciphertext / RSA / PKCS / Triple DES / Tiny Encryption Algorithm / Cryptography / Public-key cryptography / Padding

Strengthened Encryption in the CBC Mode Vlastimil Klíma 1 and Tomáš Rosa 1,2 1 ICZ, V Olšinách 75, Prague 10, Czech Republic, http://www.i.cz Department of Computer Science and Engineering, Faculty of Electri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-28 08:36:04
570Cyberwarfare / Computer network security / Public safety / Computer security / Information security / Vulnerability / Cryptography / Security / Crime prevention / National security

Security I Markus Kuhn Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/teaching/1314/SecurityI/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:10
UPDATE