Network Policy Server

Results: 104



#Item
71Choosing a Method for Connecting Java to the SAS System Across the Internet CGI, JDBC, Socket, or JConnect? Larry Hoyle Institute for Public Policy and Business Research University of Kansas  

Choosing a Method for Connecting Java to the SAS System Across the Internet CGI, JDBC, Socket, or JConnect? Larry Hoyle Institute for Public Policy and Business Research University of Kansas 

Add to Reading List

Source URL: ipsr.ku.edu

Language: English - Date: 2013-04-01 08:59:13
72Internet censorship / Email / Internet privacy / Password / Content-control software / Network security / Proxy server / Hempfield Area High School / Internet / Computing / Digital media

Procedure 2022P Electronic Resources K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote p

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2012-12-10 19:04:54
73Email / Internet censorship / Internet privacy / Password / Content-control software / Network security / Proxy server / Hempfield Area High School / Internet / Computing / Digital media

Procedure 2022P Electronic Resources K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote p

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2012-03-01 11:22:28
74Statewide Policy SUBJECT: Acceptable Use of State Information Assets  NUMBER: [removed]

Statewide Policy SUBJECT: Acceptable Use of State Information Assets NUMBER: [removed]

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 22:11:31
75Oklahoma City University Computer Use Policy[removed]Introduction General

Oklahoma City University Computer Use Policy[removed]Introduction General

Add to Reading List

Source URL: www.okcu.edu

Language: English - Date: 2007-04-10 01:00:00
76OpenView Policy Library  Product Version Obsolescence Policy- End of Support Guidelines (version 4.2) Introduction: The purpose of the Support Version Policy 4.2 (this policy) is to put forward a standard set of

OpenView Policy Library Product Version Obsolescence Policy- End of Support Guidelines (version 4.2) Introduction: The purpose of the Support Version Policy 4.2 (this policy) is to put forward a standard set of

Add to Reading List

Source URL: support.openview.hp.com

Language: English - Date: 2010-03-26 10:01:03
77LOMPOCNET SERVICE AGREEMENT AND USE POLICY Revision[removed], v.2 Page 1 of 5 THIS SERVICE AGREEMENT AND USE POLICY (

LOMPOCNET SERVICE AGREEMENT AND USE POLICY Revision[removed], v.2 Page 1 of 5 THIS SERVICE AGREEMENT AND USE POLICY ("Agreement"), governs access to and use of facilities, services or resources ("Services", as hereinafte

Add to Reading List

Source URL: www.cityoflompoc.com

Language: English - Date: 2012-08-28 19:01:34
78

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-23 18:33:24
79ENCRYPTING MAINFRAME AND SERVER TAPES TECHNOLOGY LETTER[removed]Frequently Asked Questions Technology Letter[removed]announces a change to State Administrative Manual (SAM) Section[removed]By eliminating a policy exclusion i

ENCRYPTING MAINFRAME AND SERVER TAPES TECHNOLOGY LETTER[removed]Frequently Asked Questions Technology Letter[removed]announces a change to State Administrative Manual (SAM) Section[removed]By eliminating a policy exclusion i

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:10:34
80Cisco 7140 VPN Router with ISM Security Policy Introduction This nonproprietary Cryptographic Module Security Policy describes how Cisco 7140 VPN routers meet the security requirements of the Federal Information Processi

Cisco 7140 VPN Router with ISM Security Policy Introduction This nonproprietary Cryptographic Module Security Policy describes how Cisco 7140 VPN routers meet the security requirements of the Federal Information Processi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00