Public computer

Results: 14618



#Item
721Public safety / Rural community development / Biosecurity / Physical security / Cooperative extension service / Farm / Computer security / Security / Crime prevention / National security

The University of Georgia Cooperative Extension Service College of Agricultural and Environmental Sciences / Athens, GeorgiaNOVEMBER 2006

Add to Reading List

Source URL: www.poultry.uga.edu

Language: English - Date: 2010-01-20 08:17:57
722Cyberwarfare / Public safety / War / Fusion center / National Cyber Security Division / Department of Defense Cyber Crime Center / Computer crimes / United States Department of Homeland Security / National security

global logo with tex black centeredt

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2015-05-29 10:24:25
723National security / Public safety / Crime prevention / Information security / Health Insurance Portability and Accountability Act / Standards for Security Categorization of Federal Information and Information Systems / Classified information in the United States / Security / Computer security / Data security

State of North Carolina Statewide Information Security Manual Prepared by the Enterprise Security and Risk Management Office

Add to Reading List

Source URL: www.scio.nc.gov

Language: English - Date: 2015-02-11 13:10:14
724Access control / Identity / Authentication / Electronic authentication / Multi-factor authentication / Authorization / Two-factor authentication / Identity assurance / Security / Computer security / Identity management

ITL Bulletin, Authentication Considerations for Public Safety Mobile Networks (May 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-14 08:46:44
725Database management systems / SQL / Computer data storage / Cloud computing / Database / Computing / Data management / Relational database management systems

Realtime Storage for Unity About Realtime Cloud Storage is a fully managed NoSQL database service based on Amazon DynamoDB that provides fast and predictable performance with seamless scalability.

Add to Reading List

Source URL: storage-public.realtime.co

Language: English - Date: 2015-03-31 13:11:05
726Computer network security / Computer security / Crime prevention / National security / Secure communication / Government / United States Department of Homeland Security / Cyber-security regulation / National Cyber Security Division / Security / Public safety / Cyberwarfare

HOMELAND SECURITY Team Leaders: Larry Davis, Deputy Executive Director, California Fire and Rescue Training Authority, (

Add to Reading List

Source URL: www.metrochamber.org

Language: English - Date: 2015-04-06 17:21:01
727Technology / Lesson / Teaching method / Apple Inc. / Intel / Music lesson / Teaching / Education / Computer hardware

Intel / Golden Apple STEM Teacher Grants New Mexico public school STEM (Science, Technology, Engineering and Math) teachers in grades five through eight are invited to submit a proposal to the Intel/Golden Apple STEM Tea

Add to Reading List

Source URL: www.goldenapplenm.org

Language: English - Date: 2015-04-29 13:31:26
728Cyberwarfare / Incident management / National security / Incident response team / Computer security / National Cyber Security Division / United States Computer Emergency Readiness Team / Public safety / United States Department of Homeland Security / Security

Microsoft PowerPoint15_USCG_ICS-CERT.pptx

Add to Reading List

Source URL: www.n-b-f.org

Language: English - Date: 2015-02-25 15:51:09
729Data security / National security / Public safety / Information security / Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / Cyberwarfare

Cyber Security Strategy in Sweden – work in progress  Briefing at the 2nd ENISA National Cyber Security Strategies Workshop, Riga, 150513 Swedish Government Administration

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:13:45
730Key management / Electronic commerce / Verifiable secret sharing / Key distribution / Interactive proof system / Diffie–Hellman key exchange / Authentication / Secret sharing / Computer network / Cryptography / Cryptographic protocols / Public-key cryptography

Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2006-01-24 03:14:56
UPDATE