National Information Infrastructure

Results: 4047



#Item
181Microsoft Word - FAB III Winter 2004_2005doc

Microsoft Word - FAB III Winter 2004_2005doc

Add to Reading List

Source URL: www.usgs.gov

Language: English - Date: 2012-02-27 09:30:00
182Text of the FOIA (showing changes made with the OPEN Government Act of 2007)

Text of the FOIA (showing changes made with the OPEN Government Act of 2007)

Add to Reading List

Source URL: www.dod.gov

Language: English - Date: 2015-02-06 11:08:06
183National Strategy for Information Sharing

National Strategy for Information Sharing

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:11:00
184Bilingual Co-Training for Monolingual Hyponymy-Relation Acquisition Jong-Hoon Oh, Kiyotaka Uchimoto, and Kentaro Torisawa Language Infrastructure Group, MASTAR Project, National Institute of Information and Communication

Bilingual Co-Training for Monolingual Hyponymy-Relation Acquisition Jong-Hoon Oh, Kiyotaka Uchimoto, and Kentaro Torisawa Language Infrastructure Group, MASTAR Project, National Institute of Information and Communication

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2010-06-15 03:30:21
185Insights  Factory of the Future Intel shares its insights into protecting critical infrastructure and industrial control systems.

Insights Factory of the Future Intel shares its insights into protecting critical infrastructure and industrial control systems.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-01 21:34:58
186Humans in the loop: Human-computer interaction and security - Security & Privacy Magazine, IEEE

Humans in the loop: Human-computer interaction and security - Security & Privacy Magazine, IEEE

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:38:14
187Safeguarding Your Data Multiple Tiers of Protection LeanKit’s holistic security infrastructure and advanced security measures provide protection against physical, network, server, application, and data vulnerabilities.

Safeguarding Your Data Multiple Tiers of Protection LeanKit’s holistic security infrastructure and advanced security measures provide protection against physical, network, server, application, and data vulnerabilities.

Add to Reading List

Source URL: leankit.com

Language: English - Date: 2015-05-28 17:08:06
188Endangered Species Act of 1973, As Amended through the 108th Congress

Endangered Species Act of 1973, As Amended through the 108th Congress

Add to Reading List

Source URL: www.neighborhoodcats.org

Language: English - Date: 2009-03-27 10:45:04
189Text of the FOIA (showing changes made with the OPEN Government Act of 2007)

Text of the FOIA (showing changes made with the OPEN Government Act of 2007)

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:34:26
190Note this is a hand enrollment pursuant to Public Law 105–32.  H. ROne Hundred Fifth Congress of the

Note this is a hand enrollment pursuant to Public Law 105–32. H. ROne Hundred Fifth Congress of the

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-03-06 19:36:53