and Security Technologies

Results: 1110



#Item
951United States Securities and Exchange Commission / Stock market / Finance / Financial economics / Financial regulation / Securities Exchange Act / U.S. Securities and Exchange Commission / Security / Securities Act / SEC filings / United States securities law / 73rd United States Congress

Delisting Notice: Marlton Technologies, Inc.

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2005-11-29 13:31:07
952Patch / Federal Information Security Management Act / Security Content Automation Protocol / Vulnerability / Security risk / Information security / Security controls / National Institute of Standards and Technology / IT risk management / Computer security / Security / Computing

Guide to Enterprise Patch Management Technologies

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-20 16:29:58
953Network architecture / Denial-of-service attack / Load balancing / Proxy server / Internet Relay Chat flood / Internet security / Prolexic Technologies / SYN flood / Transport Layer Security / Computing / Denial-of-service attacks / Internet

TLP: WHITE National Cybersecurity and Communications Integration Center 29 January[removed]DDoS Quick Guide

Add to Reading List

Source URL: www.ofi.la.gov

Language: English - Date: 2014-02-07 10:31:08
954Nanomaterials / Technology / Materials science / Science / Impact of nanotechnology / Regulation of nanotechnology / Emerging technologies / Nanotechnology / Time

Achieving the Vision for Perimeter Security and Economic Competitiveness

Add to Reading List

Source URL: www.wilsoncenter.org

Language: English - Date: 2013-07-02 08:50:47
955Emerging technologies / Federal Information Security Management Act / Collapse of the World Trade Center / Smart grid / Measurement / Technology / Public administration / NIST Enterprise Architecture Model / Smart grid policy in the United States / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

Microsoft Word - Final 2009 VCAT Report.doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-06-01 11:41:19
956Privacy / Law / Data privacy / Family Educational Rights and Privacy Act / Internet privacy / Information privacy law / United States Department of Education / Legal aspects of computing / LeRoy Rooker / Privacy law / Ethics / Computer law

United States House of Representatives 113th Congress, 2nd Session Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-06-26 09:22:20
957Foundry / History of the United States / Foundry products operations / United States / Manufacturing / Semiconductor device fabrication / Semiconductor fabrication plant / American Recovery and Reinvestment Act

Testimony before the U.S.-China Economic and Security Review Commission The Challenge of China’s Green Technology Policy and Ohio’s Response Ross Bushman, President Cast-Fab Technologies

Add to Reading List

Source URL: www.uscc.gov

Language: English - Date: 2013-02-13 15:54:42
958Hydrogen technologies / Hydrogen / Emerging technologies / Energy conversion / Green vehicles / Fuel cell / Hydrogen vehicle / United States Hydrogen Policy / Ballard Power Systems / Energy / Hydrogen economy / Technology

July 14, 2010  Patrick Valente  Executive Director  Ohio Fuel Cell Coalition  “Testimony before the U.S. – China Economic and Security Review Commission”  The Challenge of China’s Green T

Add to Reading List

Source URL: www.uscc.gov

Language: English - Date: 2013-02-13 15:54:59
959Electromagnetic compatibility / Electromagnetic radiation / Electromagnetic pulse / Physics / Technology / Military technology / Electromagnetic pulse in fiction and popular culture / Nuclear weapons / Energy weapons / Bombs

"ELECTROMAGNETIC PULSE: THREAT TO CRITICAL INFRASTRUCTURE" DR. PETER VINCENT PRY TESTIMONY BEFORE THE SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION AND SECURITY TECHNOLOGIES HOUSE COMMITTEE ON HOMELAND SECURIT

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-05-05 21:08:10
960Rogue software / Computer network security / Spyware / Antivirus software / Computer virus / Trojan horse / Privacy-invasive software / Espionage / Malware / System software

Michael A. Rolenz 10 February 2003 “Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies” Reply comments in support and amplification to Comment #14 of Michael A.

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2012-05-24 14:27:08
UPDATE