H.D.

Results: 42336



#Item
1

LANDTAG RHEINLAND-PFALZ 14. W a h l p e r i o d e Drucksache

Add to Reading List

Source URL: www.datenschutz.rlp.de

Language: German - Date: 2018-10-15 06:09:39
    2Law / Privacy law / Terms of service / Data security / 104th United States Congress / Data erasure / Health Insurance Portability and Accountability Act / Medical privacy / Privacy / Internet privacy

    COLOR​ ​GENOMICS,​ ​INC. NOTICE​ ​OF​ ​PRIVACY​ ​PRACTICES THIS​ N​ OTICE​ D​ ESCRIBES​ H​ OW​ M ​ EDICAL​ I​ NFORMATION​ A​ BOUT​ Y​ OU THAT IS PROTECTED UNDER THE HEALTH

    Add to Reading List

    Source URL: static.getcolor.com

    Language: English - Date: 2018-05-25 14:55:34
    3Software / Advertising / Marketing / Online advertising / Firefox add-ons / Google Chrome extensions / Advertising-free media / Microsoft Edge extensions / Ad blocking / GNOME Web / Adblock Plus / Targeted advertising

    SECURITY The Adblocking Tug-of-War The Adblocking Tug-of-War H A M E D H A D D A D I , R I S H A B N I T H YA N A N D , S H E H A R B A N O K H AT TA K , M O B I N J AV E D, N A R S EO VA L L I N A - R O D R I G U E Z ,

    Add to Reading List

    Source URL: sheharbano.com

    Language: English - Date: 2017-02-16 07:58:26
    4Computing / Cloud computing / Information technology / FedRAMP / Internet security / United States Office of Management and Budget / Proprietary software / Carahsoft / In-Q-Tel / Splunk / Cloudera / Dell

    C A R A H S O F T. CO M / V E N D O R S Solutions for Government S A L E S @ C A R A H S O F T. CO M

    Add to Reading List

    Source URL: www.carahsoft.com

    Language: English - Date: 2018-09-12 14:13:00
    5Economy / Finance / Money / Corporate finance / Entrepreneurship / Equity securities / Stock market / Private equity / Venture capital / Crowdfunding / Investor / Security

    BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs WHITEPAPER Q4 2018 AUTHORS D. ACHOUR, L. ALDOORY, H. KHOURY,

    Add to Reading List

    Source URL: www.kambio.io

    Language: English - Date: 2018-10-18 01:47:10
    6Energy / Universe / Transport economics / Transport / Energy conservation / Energy economics / Pac-car II / Aerodynamics / Energy-efficient driving / Lino Guzzella / Shell Eco-marathon / Fuel efficiency

    THE WORLD’S MOST FUEL EFFICIENT VEHICLE DESIGN AND DEVELOPMENT OF J.J. Santin, C.H. Onder, J. Bernard, D. Isler, P. Kobler, F. Kolb, N. Weidmann, L. Guzzella

    Add to Reading List

    Source URL: www.paccar.ethz.ch

    Language: English - Date: 2007-10-12 07:51:18
    7Cryptocurrencies / Blockchains / Concurrent computing / Computing / Hashgraph / Distributed ledger / Ethereum / Hedera / NEO / Smart contract / Draft:Hedera Hashgraph

    Hedera: A Governing Council & Public Hashgraph Network The trust layer of the internet Leemon Baird, Mance Harmon, and Paul Madsen w h i t e pa p e r   V.1 . 4    L a s t u p d at e d 1 7 O C T   SU B J

    Add to Reading List

    Source URL: www.hedera.com

    Language: English - Date: 2018-10-17 22:19:08
    8Port Authority of New York and New Jersey / Sofitel / AccorHotels / New Jersey / Midtown Manhattan / Transportation in the United States / RER A / O'Hare International Airport / John F. Kennedy International Airport / Orlando International Airport / Newark Liberty International Airport / Paris

    NEW YORK IS MAGNIFIQUE DISCOVER THIS STUNNING ADDRESS, BLENDING ART AND FRENCH FLAIR, S I T U AT E D I N T H E H E A R T O F T H E

    Add to Reading List

    Source URL: s3.amazonaws.com

    Language: English - Date: 2018-06-07 19:11:47
    9

    Using Speakeasy for Ad Hoc Peer-to-Peer Collaboration W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, Trevor F Smith, Dirk Balfanz, D. K. Smetters, H. Chi Wong, Shahram Izadi Palo Alto Research Center 3333 Coyote Hill

    Add to Reading List

    Source URL: trevor.smith.name

    Language: English - Date: 2012-11-23 14:19:46
      10Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

      The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2016-01-15 12:55:59
      UPDATE