F-Secure

Results: 745



#Item
551XMetaL / Software / U.S. Immigration and Customs Enforcement / United States Secretary of Homeland Security / Secure Communities and administrative immigration policies / Government / Public safety / United States Department of Homeland Security / SoftQuad Software / Illegal immigration to the United States

F:\SEF\SEF_229.XML AMENDMENT OFFERED BY

Add to Reading List

Source URL: amendments-rules.house.gov

Language: English - Date: 2015-01-09 17:05:35
552Health care provider / Profession / Licensure / Dental hygienist / Optometry / Medicine / Sociology / Respiratory therapy

Building a Fair, Transparent, Timely and Consistent Licensing Process for All Applicants Ontario Regulators for Access Consortium One of the key challenges that immigrants face when trying to secure employment in their f

Add to Reading List

Source URL: mcbsol.com

Language: English - Date: 2014-08-10 11:27:15
553National security / Computer crimes / Computer network security / Secure communication / Howard Schmidt / Trustworthy computing / International Multilateral Partnership Against Cyber Threats / Trusted computing base / Comprehensive National Cybersecurity Initiative / Cyberwarfare / Security / Computer security

C OV ER F E AT U RE MOVING TOWARD TRUSTWORTHY SYSTEMS: R&D ESSENTIALS

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 11:35:47
554Wireless networking / Mobile device management / Mobile application management / Windows Mobile / BlackBerry / F-Secure / Email / Technology / Computing / Wandering WiFi

CTS Mobile Data Management (MDM) Service Offering November 30, 2014 Feature Comparison AirWatch Management Suites: AirWatch markets their products in Management Suites. Using a color code (see AW Management Suites), each

Add to Reading List

Source URL: www.cts.wa.gov

Language: English - Date: 2015-01-02 18:03:01
555Cloud computing / Computing / Cloud applications / Content management systems / Collaboration / Web applications

cloudDocs Annotate s o f t w a r e Secure documents with your comments saved in the cloud!

Add to Reading List

Source URL: www.ebigpicture.com

Language: English - Date: 2012-11-19 18:14:08
556System software / Malware / Computer crimes / Denial-of-service attack / Symantec / F-Secure / Keystroke logging / Antivirus software / Computer security / Cyberwarfare

C-SAWR 026 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-07-25 06:52:07
557Statistics / Synthetic data / Database management systems / Data mining / Database / Secure multi-party computation / Record linkage / Data quality / Regression analysis / Data management / Information / Data

NISS Secure Regression on Distributed Databases Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, and Jerome P. Reiter Technical Report Number 141

Add to Reading List

Source URL: www.niss.org

Language: English - Date: 2004-08-30 09:30:40
558Estimation theory / Data analysis / Expectation–maximization algorithm / Missing data / Linear regression / Multivariate normal distribution / Variance / Normal distribution / Statistics / Econometrics / Regression analysis

NISS Secure Regression for Vertically Partitioned, Partially Overlapping Data Jerome P. Reiter, Christine N. Kohnen, Alan F. Karr Xiaodong Lin, and Ashish P. Sanil

Add to Reading List

Source URL: www.niss.org

Language: English - Date: 2004-10-21 14:14:40
559Wireless / Electronic engineering / Hotspot / Nintendo Wi-Fi Connection / Wireless access point / Tethering / Devicescape Software / Wi-Fi Direct / Technology / Wi-Fi / Wireless networking

TAINTED LOVE: HOW WI-FI BETRAYS US freedome.f-secure.com

Add to Reading List

Source URL: fsecureconsumer.files.wordpress.com

Language: English - Date: 2014-09-29 12:53:09
560Database management systems / Database / Database theory / Linear regression / Statistics / Regression analysis / Econometrics

NISS Secure, Privacy-Preserving Analysis of Distributed Databases Alan F. Karr, William J. Fulp, Francisco Vera, S. Stanley Young, Xiaodong Lin and Jerome P. Reiter

Add to Reading List

Source URL: www.niss.org

Language: English - Date: 2005-12-08 08:16:04
UPDATE