Public computer

Results: 14618



#Item
71Library science / Technology / Digital media / Public library / Public computer / Internet / Information science / Sumter County Library /  FL / Kropyvnytskyi Region Universal Research Library

Microsoft Word - Acceptable Use of Computers and the Internet by Adult Patrons 2014.doc

Add to Reading List

Source URL: www.plainfieldlibrary.net

Language: English - Date: 2016-07-26 12:17:04
72Cryptography / Computer security / Security / Computer access control / Challengeresponse authentication / Password / Cryptographic nonce / Authentication / Server / Biometrics / Key / Public-key cryptography

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 13:04:18
73Library science / Technology / Security / Internet / Public computer / Library / Computer security / Public library / Sumter County Library /  FL / Kropyvnytskyi Region Universal Research Library

HERITAGE PUBLIC LIBRARY PUBLIC ACCESS COMPUTER AND INTERNET POLICY Subject to the laws, regulations, and ordinances of the United States of America, the Commonwealth of Virginia, and the counties of Charles City and New

Add to Reading List

Source URL: www.heritagepubliclibrary.org

Language: English - Date: 2014-06-16 17:07:41
74Security / Academia / Internet of Things / Economic development / Organizational theory / Public policy / Smart city / Sustainable urban planning / Computer security / Penton / ISO/IEC JTC 1/SWG 5

Real-world IoT. 
 Real people.
 Real projects. MANUFACTURING

Add to Reading List

Source URL: www.bpinetwork.org

Language: English - Date: 2016-06-22 19:21:38
75Computer hardware / Sound / Audio engineering / Sound recording / Audio electronics / Loudspeakers / Foxconn / IPod / Public address system / Phone connector / Microphone / Horn loudspeaker

Event Group – Mobile Public Address Caravans Event Services pioneered the very first mobile PA units for Fetes, Sporting events and occasions way back inOur latest

Add to Reading List

Source URL: www.eventgroup.gg

Language: English - Date: 2015-02-25 07:02:18
76Computing / Software / Computer programming / Equations / Mathematical optimization / Application programming interfaces / Bellman equation / Control theory / Dynamic programming / Qt / P22 / Ramsey problem

History dependent public policies David Evans ∗ Thomas J. Sargent‡†

Add to Reading List

Source URL: www.tomsargent.com

Language: English - Date: 2015-04-08 13:04:02
77Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
78Computer vision / Image registration / Medical imaging / Genealogy / Public records

Children’s Services Farmingdale Public LibraryFor Children Ages: Birth - Entering Grade 5

Add to Reading List

Source URL: www.farmingdalelibrary.org

Language: English - Date: 2016-06-17 10:33:09
79Library science / Information science / Information management / Information / Collection development / Public library / Librarian / Library / Intellectual freedom / Special library

Library & Information Science Program Information & Computer Sciences Department COURSE SYLLABUS LIS 615:

Add to Reading List

Source URL: www2.hawaii.edu

Language: English - Date: 2007-11-25 23:05:33
UPDATE