Public computer

Results: 14618



#Item
111Software engineering / Computer programming / Programming language theory / Icon / Public-domain software / Executive education / Unicon / Survey methodology / Surveying

Designing And Delivering Customized Programs With Impact Elizabeth Weldon, PhD www.ExecEdWithImpact.com In this report, I describe the results of a UNICON survey designed to identify the key

Add to Reading List

Source URL: www.execedwithimpact.com

Language: English - Date: 2016-05-17 13:26:48
112Computing / Cloud computing / Cloud infrastructure / Cloud storage / Data security / Security / Storage security / OpenStack / File hosting service / Public-key cryptography / Computer data storage / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-23 09:05:36
113Cryptography / Modular arithmetic / Zero-knowledge proof / Quadratic residue / RSA / FeigeFiatShamir identification scheme / IP / Public-key cryptography

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-02-25 05:09:48
114Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Certificate authority / Smart card / Public key certificate / Security token / Authentication / Certificate policy

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
115Computing / Cloud infrastructure / Cask / OpenStack / Apache Hadoop / Cloud computing / Computer cluster / Google App Engine / MongoDB

Cask Coopr is an open source template-based cluster management solution that provisions, manages and scales clusters for multi-tiered application stacks on public and private clouds. Features

Add to Reading List

Source URL: docs.cask.co

Language: English - Date: 2015-08-04 21:39:15
116Security / Prevention / Safety / Crime prevention / National security / Public safety / Physical security / Perimeter security / Security guard / Computer security / Access control / Identity document

Introduction to Security Awareness Briefing Office of Security @ NOAA

Add to Reading List

Source URL: www.osec.doc.gov

Language: English - Date: 2012-02-22 10:48:16
117Computer security / Personal computing / Public computer / Computer / Login / Computing

Mesa County Libraries Computer Use Rules General Rules    

Add to Reading List

Source URL: mesacountylibraries.org

Language: English - Date: 2016-04-04 13:36:32
118Software engineering / Computer programming / Computing / Cross-platform software / Lasso

Author’s response to reviews Title: Factors Associated with Performing Tuberculosis Screening of HIV-Positive Patients in Ghana: LASSO-based Predictor Selection in a Large Public Health Data Set Authors: Susanne Muelle

Add to Reading List

Source URL: static-content.springer.com

Language: English
119Security / Prevention / Safety / Crime prevention / Security guards / Surveillance / Physical security / Public safety / United States Department of Homeland Security / Computer security / Job Corps

HOMELAND SECURITY C AREER PATHWAY C A REER TECHNIC A L T R A IN ING A RE A

Add to Reading List

Source URL: www.jobs.alaska.gov

Language: English - Date: 2016-04-08 18:27:20
120Cryptography / Public-key cryptography / E-commerce / Public key infrastructure / Key management / Computer security / Public key certificate / SOA Security

information leakage malicious intermediary information leakage information leakage malicious intermediary insufficient authorization

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:18:27
UPDATE