F-Secure

Results: 745



#Item
121Systems theory / State space / International Obfuscated C Code Contest / Classical cipher / Control theory / Computing / Computer programming

F o r m a l M o d e l s for C o m p u t e r S e c u r i t y CARL E. LANDWEHR Code 7593, Naval Research Laboratory, Washington, D CEfforts to build "secure" computer systems have now been underway for more than a

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:28
122

Internet Security 2015 2 | Inhoud | Internet Security 2015 Inhoud

Add to Reading List

Source URL: www.f-secure.com

Language: Dutch - Date: 2015-02-18 01:11:47
    123Budgets / Funding

    Budget Help Developing your budget is a critical phase of your project if you hope to secure funding from public or private sources. It is also a good way to clarify what you will and will not be doing in your project. F

    Add to Reading List

    Source URL: mainearts.maine.gov

    Language: English - Date: 2015-01-20 13:43:41
    124Budgets / Funding

    Budget Help Developing your budget is a critical phase of your project if you hope to secure funding from public or private sources. It is also a good way to clarify what you will and will not be doing in your project. F

    Add to Reading List

    Source URL: mainearts.maine.gov

    Language: English - Date: 2015-01-20 13:43:41
    125Fax / F-Secure / Technology / Computing / Email

    New Mexico Secure Holding Log LAW ENFORCEMENT ADMINISTRATIVE BUILDINGS Name of Law Enforcement Department: ______________________Dates This Log Covers: __________________________________ Name and Phone Number of Contact

    Add to Reading List

    Source URL: cyfd.org

    Language: English - Date: 2015-01-30 12:09:26
    126Fashion / Penology / Prison / Undergarment / Sleeveless shirt / Clothing / Cultural history / Culture

    E/F DORMS APPROVED PROPERTY LIST These items will be accepted for inmates housed in the Class-D Facility (Males) C-Dorm Property is the same as the Secure Side of the Facility THE FOLLOWING ITEMS MAY BE REPLACED EVERY 3

    Add to Reading List

    Source URL: www.warrencountyjail.com

    Language: English - Date: 2015-01-26 13:57:55
    127Museum / Humanities / Cultural studies / Science / Museology / Collection / Explorer Search and Rescue

    EARL H. SWANSON ARCHAEOLOGICAL REPOSITORY Collections Use Policy 1. All persons using the collections shall first secure the permission of the Collections Manager. Permission is secured with the submission of a Request f

    Add to Reading List

    Source URL: imnh.isu.edu

    Language: English - Date: 2013-03-21 12:27:46
    128National security / Electronic commerce / Cryptographic protocols / Password / Computer security / HTTP Secure / Two-factor authentication / Single sign-on / Password manager / Security / Secure communication / Crime prevention

    Security Overview Who owns the data I put on my Dozuki site? You do! Dozuki has no claim of ownership on your site’s content. Will you (Dozuki) access my private content? Not unless you specifically ask us to, or if we

    Add to Reading List

    Source URL: f.cl.ly

    Language: English - Date: 2014-03-04 19:48:33
    129Fifth Avenue / V / 1 / M / 6 / B / F / 2 / 3 / New York City Subway / A / 4

    Bus detours for June 1-2 Effective 9 a.m. Monday, June 1, 2015, and continuing through Tuesday, June 2 unless otherwise noted, 13 bus routes will be on detours due to the Hype Energy Event. Broadway will be closed betwee

    Add to Reading List

    Source URL: secure.nashvillemta.org

    Language: English - Date: 2015-05-29 13:09:14
    130Secure Digital

    State Aid Comparison FYWith TPP/Dereg Phase-Out (By FY16 Capacity Measure, Column F) A Count

    Add to Reading List

    Source URL: obm.ohio.gov

    Language: English - Date: 2015-02-09 15:25:30
      UPDATE