Public computer

Results: 14618



#Item
81Free and open-source software licenses / GNU Project / Copyleft / Free software / Computer law / Open-source movement / Software / GNU General Public License / GNU Lesser General Public License / GNU / GPL linking exception

GNU LESSER GENERAL PUBLIC LICENSE Version 3, 29 June 2007 Copyright © 2007 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of t

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2016-08-06 18:08:10
82Security / Computer network security / Cyberwarfare / Computer security / Cryptography / National security / Public-order crime / Threat / Political faction / Classified information in the United Kingdom

VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK (VPDSF) VPDSF BUSINESS IMPACT LEVEL (BIL) TABLE

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-08-09 01:19:38
83Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
84Academia / Knowledge / Academic conferences / Academic publishing / EasyChair / School of Computer Science /  University of Manchester / Public sphere / Compendex / Electronic submission / Biomechanics / Abstract

November 2-5, 2016, Istanbul, Turkey http://www.icmib.org/ Conference Highlights All accepted papers of ICMIB 2016 will be published in the conference proceedings, which will be indexed by Ei Compendex, or IJMLC.

Add to Reading List

Source URL: www.icmib.org

Language: English - Date: 2016-08-02 02:29:23
85Security / Prevention / Safety / Crime prevention / Security guards / Public safety / Surveillance / Bodyguard / Academi / Corporate security / Computer security

TACTICAL SECURITY/SAFETY TECHNIQUES ENTERPRISES, INC. PO Box 4794 • Poughkeepsie, NY 12602 • (Website: www.tstenterprisesinc.com E-mail Addresses: WILLIAM J. SLEIGHT, III Preside

Add to Reading List

Source URL: www.tstenterprisesinc.com

Language: English - Date: 2016-04-02 14:26:28
86Computing / Internet privacy / Internet / Computer security / Privacy / Identity management / Internet security / Human rights / Tor / Information privacy / Google Public DNS / HTTP cookie

DE GRUYTER OLDENBOURG it – Information Technology 2015; Galley Proof Self-Portrayals of GI Junior Fellows Dominik Herrmann*

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-03-23 12:56:37
87Economy / Computing / Finance / E-commerce / Public finance / Banking in Canada / Tax-Free Savings Account / Registered Retirement Savings Plan / Remote backup service / Tax / USB flash drive / Computer security

VOLUME 23, ISSUE 02 April 2009 INDEX Taxation Know the Tax Rules

Add to Reading List

Source URL: www.mccayduff.com

Language: English - Date: 2014-06-12 10:06:11
88Software / HUBzero / Free software / Software licenses / Computer law / Free and open-source software licenses / Computing / Open-source movement / Open-source software / GNU General Public License

HUBzero Service Agreement This HUBzero Service Agreement is entered into between HUBzero Foundation LLC, an Indiana limited liability company (sometimes referred to herein as the “Foundation”), and __________________

Add to Reading List

Source URL: hubzero.org

Language: English - Date: 2014-08-11 10:09:23
89Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-04-20 05:08:37
90

ANDERSON PUBLIC LIBRARY TEEN ROOM POLICY Anderson Public Library’s Teen Room was created as a dedicated space for teens to gather, socialize, and use library resources. Therefore, the Teen Room and the computer termina

Add to Reading List

Source URL: www.and.lib.in.us

- Date: 2016-05-27 18:31:47
    UPDATE