Public computer

Results: 14618



#Item
671Environment / Waste legislation / Recycling / Water conservation / Electronic waste / Zero waste / Waste Management /  Inc / Extended producer responsibility / Computer recycling / Waste management / Sustainability / Industrial ecology

NEBRASKA RECYCLING STUDY March 2015 Study Conducted by: University of Nebraska Public Policy Center Joslyn Institute for Sustainable Communities

Add to Reading List

Source URL: recyclenebraska.org

Language: English - Date: 2015-05-07 13:17:08
672XML / Computer file formats / Open formats / OASIS / DocBook / Computing / Markup languages / Technical communication

Akoma Ntoso Naming Convention Version 1.0 Committee Specification Draft 01 / Public Review DraftJanuary 2015 Specification URIs

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2015-01-14 12:00:00
673Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
674Electronic commerce / Secure communication / National security / Encryption / Authenticated encryption / Public-key cryptography / Computer security / Transport Layer Security / Information security / Cryptography / Security / Cryptographic protocols

INVITED PAPER Privacy and Cybersecurity: The Next 100 Years This paper discusses the interrelationship of privacy and cybersecurity and

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:27:06
675Crime prevention / National security / United States Department of Homeland Security / National Telecommunications and Information Administration / Digital Opportunity Investment Trust / Computer security / Government / Security / Public safety

PDF Document

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2010-04-23 11:46:16
676Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:10
677User interface techniques / Multimodal interaction / Mixed reality / Human communication / Computer-supported cooperative work / Augmented reality / Usability / Human–computer interaction / Human–computer interaction / Reality

Chained Displays: Configurations of Public Displays can be used to influence Actor-, Audience-, and Passer-By Behavior Maurice ten Koppel Gilles Bailly

Add to Reading List

Source URL: www.gillesbailly.fr

Language: English - Date: 2012-01-21 09:15:44
678Public safety / Data security / Prevention / Computer security / Information security / Security engineering / Security policy / Information systems / Security / Crime prevention / National security

Chapter 24: Conclusions C H A P TE R 24 Conclusions

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 10:25:28
679Computer security / Business / Information technology audit / Information security / ICQ / Internal control / Information technology security audit / Business continuity planning / Security controls / Auditing / Data security / Security

As public servants, it is our responsibility to use taxpayers’ dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons to place

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2015-05-11 14:09:28
680National security / Surveillance / Electronic commerce / Security guard / Computer security / Security / Crime prevention / Public safety

IT Security system in Latvia achievements, statistics and challenges DSS Conference, Riga, Baiba Kaškina, CERT.LV

Add to Reading List

Source URL: cert.lv

Language: English - Date: 2013-11-07 15:18:51
UPDATE