David A. Wheeler

Results: 33



#Item
21A COMPARISON OF TWO METHODS OF ADJUSTING FOR NONCOVERAGE OF NONTELEPHONE HOUSEHOLDS IN A TELEPHONE SURVEY David C. Hoaglin, Michael P. Battaglia, Abt Associates Inc. David C. Hoaglin, Abt Associates Inc., 55 Wheeler Stre

A COMPARISON OF TWO METHODS OF ADJUSTING FOR NONCOVERAGE OF NONTELEPHONE HOUSEHOLDS IN A TELEPHONE SURVEY David C. Hoaglin, Michael P. Battaglia, Abt Associates Inc. David C. Hoaglin, Abt Associates Inc., 55 Wheeler Stre

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2010-11-17 10:55:36
22C ivic Committee Meeting M inutes A pril 3, 2012 Present: Mick Fitzharris, Valerie Hutchinson, Rodney Jestr, David Claney (guest), Albert Marks, Rodney Jestr, Tom Wheeler, Ed Rohrbach, Ron Meick (guest) and David Claney

C ivic Committee Meeting M inutes A pril 3, 2012 Present: Mick Fitzharris, Valerie Hutchinson, Rodney Jestr, David Claney (guest), Albert Marks, Rodney Jestr, Tom Wheeler, Ed Rohrbach, Ron Meick (guest) and David Claney

Add to Reading List

Source URL: arden.delaware.gov

Language: English - Date: 2012-04-19 05:52:33
    23Computer law / Free content / Open-source software / Copyleft / GNU Project / Free software / The Free Software Definition / Open-source hardware / Free and open source software / Software licenses / Open content / Law

    What is open security? What is open security? David A. Wheeler

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2013-08-21 09:52:19
    24Securing Open Source Software (OSS or FLOSS) David A. Wheeler May 5, 2008  This presentation contains the views of the author and does not indicate

    Securing Open Source Software (OSS or FLOSS) David A. Wheeler May 5, 2008 This presentation contains the views of the author and does not indicate

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2008-05-05 17:30:45
    25What is open security? David A. Wheeler August 21, 2013 INSTITUTE  FOR

    What is open security? David A. Wheeler August 21, 2013 INSTITUTE FOR

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2013-08-21 10:03:13
    26Secure Programming for Linux and Unix HOWTO David A. Wheeler  Secure Programming for Linux and Unix HOWTO

    Secure Programming for Linux and Unix HOWTO David A. Wheeler Secure Programming for Linux and Unix HOWTO

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2004-08-22 23:51:26
    27Open Standards and Security David A. Wheeler July 12, 2006 This presentation contains the views of the author and does not indicate endorsement by IDA, the U.S. government, or the U.S. Department of Defense.

    Open Standards and Security David A. Wheeler July 12, 2006 This presentation contains the views of the author and does not indicate endorsement by IDA, the U.S. government, or the U.S. Department of Defense.

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2006-07-12 12:47:16
    28Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) David A. Wheeler May 7, 2013 http://www.dwheeler.com/trusting-trust

    Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) David A. Wheeler May 7, 2013 http://www.dwheeler.com/trusting-trust

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2013-05-07 14:15:25
    29http://www.dwheeler.com  http://www.dwheeler.com

    http://www.dwheeler.com http://www.dwheeler.com

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2003-03-30 17:30:31
    30Secure Programming for Linux and Unix HOWTO  David A. Wheeler

    Secure Programming for Linux and Unix HOWTO David A. Wheeler

    Add to Reading List

    Source URL: www.dwheeler.com

    Language: English - Date: 2003-03-03 17:24:42