Secrecy

Results: 11054



#Item
711Government / Information Security Oversight Office / Interagency Security Classification Appeals Panel / Declassification / Public Interest Declassification Board / Classified information / National Industrial Security Program / Moynihan Commission on Government Secrecy / Central Intelligence Agency / United States government secrecy / National security / Security

2004 Report to the President

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:40:34
712Identity management / Identity management systems / Spamming / Federated identity / Email / Security Assertion Markup Language / Phishing / SAML 2.0 / Qualys / Computer security / Computing / System software

Security and Privacy Technology & Infrastructure Military Grade Encryption Cotap encrypts data in transit and at rest using AES 256-bit with perfect forward secrecy key

Add to Reading List

Source URL: info.cotap.com

Language: English - Date: 2015-05-24 17:10:19
713Data privacy / Declassification / Disclosure / Government / National security / Central Intelligence Agency / Dianne Feinstein / Public Interest Declassification Board / Information / United States government secrecy / Classified information

Case 1:13-cvJEB Document 20-1 FiledPage 2 of 3 THE WHITE HOUSE WASHINGTON Aprill8, 2014

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-21 08:32:59
714Government / Data security / Information Security Oversight Office / National Archives and Records Administration / Crime prevention / Computer security / Declassification / National Industrial Security Program / Classified information / National security / Security / United States government secrecy

Report on Cost Estimates for Security Classification Activities for 2004

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:40:32
715United States government secrecy / Google / Keith / National security / Security / Computing / Mass surveillance / National Security Agency

Dof lID : 1 t0 8 7 fi 1"L From: Sent:

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-05-06 01:21:12
716Business law / Private law / Secrecy / Trade secret / Unfair competition / Know-how / Privacy / Government procurement in the United States / Agreement on Trade-Related Aspects of Intellectual Property Rights / Law / Intellectual property law / Ethics

P1: JtR Chap28 CY564-Unctad-v1 November 30, 2004

Add to Reading List

Source URL: www.iprsonline.org

Language: English - Date: 2009-11-04 05:36:31
717Law / Financial Crimes Enforcement Network / Treasury regulations / Regulatory Flexibility Act / Rulemaking / Internal Revenue Service / Code of Federal Regulations / Bank Secrecy Act / Office of Information and Regulatory Affairs / United States administrative law / Government / Politics of the United States

Department of the Treasury Preliminary Plan for Retrospective Analysis of Existing Rules May 18, 2011 I. Executive Summary of Preliminary Plan and Compliance with Executive Order

Add to Reading List

Source URL: www.americanbenefitscouncil.org

Language: English - Date: 2014-02-20 18:30:19
718Journalism sourcing / Secrecy / Law / Consent / Child abuse / Misattributed paternity / Ethics / Applied ethics / Confidentiality

You can find the latest version of this guidance on our website at www.gmc-uk.org/guidance. Confidentiality: reporting gunshot and knife wounds 1 In our Confidentiality guidance, we advise that:

Add to Reading List

Source URL: www.gmc-uk.org

Language: English - Date: 2015-05-29 10:10:41
719Confidentiality / Journalism sourcing / Secrecy

Case Study Project Name Name-On Cards

Add to Reading List

Source URL: www.tricomdata.com

Language: English - Date: 2011-02-09 08:31:04
720Digital audio / Watermark / Transmission Control Protocol / Latency / Network packet / Information / Paper / Printing / Watermarking / Digital watermarking / Audio watermark detection

On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques∗ Pai Peng Peng Ning Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
UPDATE