C*Base

Results: 1722



#Item
171Computer network security / Internet Protocol / IPv6 / Trusted computing base / Computer network / Virtual private network / Kernel / Capability-based security / Ring / Computer security / Security / Computing

An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2007-12-17 22:49:19
172Aviation / Transport / American architecture / John F. Kennedy International Airport / Pan American World Airways / Pan Am / Aviation in New York City

M IA M I C ITY HA LL The Miami City Hall was originally built in 1933 to serve as the Pan American World Airways Seaplane Base and Terminal Building. The Art Deco style structure has been designated as a local historic s

Add to Reading List

Source URL: rjha.net

Language: English - Date: 2012-08-17 04:25:45
173Base acreage / Farm Service Agency / Direct and Counter-Cyclical Program / United States Department of Agriculture / Agriculture in the United States / Agricultural subsidies

FARM PROGRAM D E C I S I O N G UI D E

Add to Reading List

Source URL: farmbilltoolbox.farmdoc.illinois.edu

Language: English - Date: 2015-02-16 11:10:11
174

DEPARTMENT OF DEFENSE DD 1414 BASE FOR REPROGRAMMING ACTIONS DIVISION C OF PUBLIC LAW, DEPARTMENT OF DEFENSE APPROPRIATIONS ACT, 2015

Add to Reading List

Source URL: comptroller.defense.gov

- Date: 2015-02-20 14:19:33
    175National Scout jamboree / The Summit Bechtel Family National Scout Reserve / Boy Scouting / World Scout Jamboree / Florida National High Adventure Sea Base / Jamboree / Eagle Scout / Winkler v. Rumsfeld / High-adventure bases of the Boy Scouts of America / Scouting / Outdoor recreation / Boy Scouts of America

    R DN HERE C ME THE SCOUTS!

    Add to Reading List

    Source URL: www.wonderfulwv.com

    Language: English - Date: 2013-09-11 10:42:06
    176Crime prevention / National security / Trusted Computer System Evaluation Criteria / Trusted computing base / Vulnerability / Information security / Trusted system / Common Criteria / Software security assurance / Computer security / Security / Data security

    TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:00:26
    177

    Come funziona internet venerdì 2 agosto 13 Contenuti > Come funziona internet Nel secondo incontro vediamo cosa c’è alla base di questa innovazione ed in che modo ci aiuta,

    Add to Reading List

    Source URL: ascuoladiinternet.it

    Language: Italian - Date: 2013-08-02 12:49:59
      178Contract law / Government procurement / Building engineering / Sureties / Retainage / Equitable adjustment / Defense Base Act / Submittals / General contractor / Construction / Law / Architecture

      TABLE OF CONTENT REQUEST FOR QUOTATIONS - CONSTRUCTION ...................................................................................2 A. B. C. D.

      Add to Reading List

      Source URL: photos.state.gov

      Language: English - Date: 2015-06-08 16:38:35
      179

      BASE DE DATOS EMPRESAS DBA_C_BDESERVICIO DE COMPRAS Y PATRIMONIO ACTUALIZACIÓN

      Add to Reading List

      Source URL: dip-badajoz.es

      Language: Spanish - Date: 2014-06-19 07:44:54
        180Commodore 64 / Retrocomputing / Internet protocols / Remote administration software / Telnet / Contiki / C*Base / Punter / PETSCII / Computing / Classes of computers / Software

        C64 TELNET BBS GUIDE antidote.hopto.org:23 Version 2.0 Thanks to Jucke/G*P and Morphfrog/ex.Hitmen, all Antidote supporters and old boardcallers!

        Add to Reading List

        Source URL: www.triad.se

        Language: English - Date: 2011-07-27 18:07:08
        UPDATE