Public computer

Results: 14618



#Item
731Technical communication / Computer file formats / Common Alerting Protocol / Internet standards / Abstract Syntax Notation One / Emergency Alert System / Specific Area Message Encoding / HTML / OASIS / Computing / OSI protocols / Markup languages

Common Alerting Protocol Version 1.2 Public Review Draft 02

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2009-11-08 16:28:51
732Public safety / National security / Computer security / Information Systems Security Association / Information security / Security guard / Security / Data security / Crime prevention

FOR IMMEDIATE RELEASE Jim Goyjer: (Email: Jeremiah Grossman, Founder and iCEO of WhiteHat Security. to Speak at ISSA-LA Sixth Annual Information Security Summit on Cybercrime So

Add to Reading List

Source URL: summit.issala.org

Language: English - Date: 2014-05-06 13:43:24
733Computer security / Computing / Electronic commerce / Crime prevention / National security / Public safety / Penetration test / Application security / Cloud computing / Computer network security / Security / SoftServe

CASE STUDY Security Audit of a Mobile Application Client Background

Add to Reading List

Source URL: www.softserveinc.com

Language: English - Date: 2014-07-23 06:27:56
734Disaster preparedness / Incident management / Traffic signals / Incident Command System / Ramp meter / Computer-aided dispatch / Emergency / Traffic Message Channel / Public safety / Management / Emergency management

Transportation Management System (TMC) Survey GENERAL INFORMATION 1. Center name: center_name

Add to Reading List

Source URL: www.itsdeployment.its.dot.gov

Language: English - Date: 2014-09-18 13:57:50
735National security / Public safety / Computer security / Information Systems Security Association / Information security / Nonprofit organization / Security / Data security / Crime prevention

FOR IMMEDIATE RELEASE Jim Goyjer or Danielle Tarasiuk: (Email: ISSA-LA Donates $25,000 for Nonprofits to Attend the Sixth Annual Information Security Summit on Cybercrime Soluti

Add to Reading List

Source URL: summit.issala.org

Language: English - Date: 2014-11-12 00:52:41
736File sharing / Copyright law / Computer law / Virtual communities / Digital Millennium Copyright Act / Peer-to-peer file sharing / Copyright infringement / Grokster / Copyright / Law / Intellectual property law / Computing

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAWThe Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including music, vid

Add to Reading List

Source URL: www.trenholmstate.edu

Language: English - Date: 2013-05-28 18:22:00
737System software / Gesture / Interaction technique / User interface / Musical gesture / Human–computer interaction / Multi-touch / Graphical user interface / GUI widget / User interface techniques / Software / Human–computer interaction

No Need to Stop: Menu Techniques for Passing by Public Displays Tongyan Ning Chat Wacharamanotham

Add to Reading List

Source URL: www.gillesbailly.fr

Language: English - Date: 2011-11-01 18:51:44
738Public safety / National security / Electronic commerce / Surveillance / Computer security / Penetration test / Security guard / Security / Crime prevention / Computer network security

CERT_prezentacija_EN-v2 [Read-Only]

Add to Reading List

Source URL: www.cert.lv

Language: English - Date: 2012-12-13 11:24:11
739Computer hardware / LCD projector / Microsoft PowerPoint / Catering / Technology / Winters House / Projectors / Software / Overhead projector

Fee Schedule for Use of Salt Lake City Public Library System Meeting Rooms CLEANING FEES 1-49 Light

Add to Reading List

Source URL: www.slcpl.lib.ut.us

Language: English - Date: 2011-06-10 20:12:39
740Caregiver / Youth Internet Safety Survey / Major depressive disorder / Psychiatry / Human behavior / Mind / Family / Child sexual abuse / Computer crimes

Growing Up With Media: Mental Health and Psychosocial Indicators April 2013 Researchers, public policy officials, and the general public as a whole have long been concerned about the consequences of youth’s exposure to

Add to Reading List

Source URL: dev.innovativepublichealth.org

Language: English - Date: 2015-06-02 13:48:51
UPDATE