Secure copy

Results: 102



#Item
41Performance measurement / Balanced scorecard / Performance management / Efficiency / Third-generation balanced scorecard / Business performance management / Management / Business / Accountability

This is an archive copy of a document originally located at _http://www.ausport.gov.au/events/osf/daws.htm_ HOW CAN WE "MEASURE" THE EFFICIENCY OF SPORT IN THE FUTURE? Mike Daws, Aaron Smith, Hans Westerbeek Introducti

Add to Reading List

Source URL: secure.ausport.gov.au

Language: English - Date: 2013-12-09 22:48:04
42Cryptographic software / Internet protocols / Internet standards / Remote administration software / Cryptographic protocols / Secure Shell / Secure copy / Telnet / File Transfer Protocol / System software / Computing / Software

Guidelines for Automated Access Management Using Secure Shell (SSH)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 10:20:19
43PTT Bulletin Board System / Taiwanese culture

PC-Secure-Leaflet2014-v6 copy

Add to Reading List

Source URL: www.wharftt.com

Language: English - Date: 2014-06-03 06:04:16
44Australian Sports Commission / Sport in Australia / Telstra / Athletics / Economy of Australia / Sports / Athletics in Australia / Athletics Australia

This is an archive copy of a document originally located at _http://www.activeaustralia.org/business/athleticsboost.htm_   _Available_as_a_PDF_for_printing_ Athletics Australia overhaul boosts performance By Chris Rya

Add to Reading List

Source URL: secure.ausport.gov.au

Language: English - Date: 2013-12-16 23:01:20
45PTT Bulletin Board System / Taiwanese culture

PC-Secure-Leaflet2014-v6 copy

Add to Reading List

Source URL: www.wharftt.com

Language: English - Date: 2014-06-03 06:04:16
46Tax File Number / Business / Security / Identity document / Certified copy / Tax / Invoice / Taxation in Australia / National identification numbers / Government

HOW TO apply for a super payout STEP 1 – CHECK THAT YOU’RE ELIGIBLE You wish to receive part or all of your super payout in cash

Add to Reading List

Source URL: secure.superfacts.com

Language: English - Date: 2014-10-15 01:38:19
47Trusted computing / Next-Generation Secure Computing Base / PlayReady / Copy Control / Trusted Platform Module / InterTrust Technologies / Copy protection / OMA DRM / Protected Media Path / Computer security / Digital rights management / Copyright law

Technological Copyright Enforcement and Open Access Volker Grassmuck for Open Archives Forum Workshop[removed]HU Berlin

Add to Reading List

Source URL: www.oaforum.org

Language: English - Date: 2003-10-17 10:49:35
48System software / Secure copy / PuTTY / Secure Shell / WinSCP / Chmod / Operating system / Comparison of SSH clients / SecureCRT / Software / Cryptographic software / Computing

CS 1301 Lab 2 – Introduction to UNIX Due: Friday, February 25th, before 6 PM Notes:  Do not wait until the last minute to do this assignment in case you run into problems.  If you find an error in the homework as

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2011-02-15 10:08:22
49FTP / Internet protocols / Internet privacy / Grid computing / GridFTP / Cryptographic protocols / Secure copy / Secure Shell / File Transfer Protocol / Computing / Network architecture / Internet

Microsoft Word - Globus Online 2011.docx

Add to Reading List

Source URL: www.mcs.anl.gov

Language: English - Date: 2011-06-28 12:29:56
50Computer-mediated communication / Anti-spam techniques / Mozilla Thunderbird / Gmail / Blind carbon copy / Secure messaging / Email / Software / Computing

CutOnce - Recipient Recommendation and Leak Detection in Action Ramnath Balasubramanyan Language Technologies Institute Carnegie Mellon University [removed]

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-04-11 10:31:16
UPDATE