Secure state

Results: 991



#Item
141Secure Digital

State Aid Comparison FYWith TPP/Dereg Phase-Out (By FY16 Capacity Measure, Column F) A Count

Add to Reading List

Source URL: obm.ohio.gov

Language: English - Date: 2015-02-09 15:25:30
    142Sales tax / Fee / Business / Property law / State taxation in the United States / Money / Law / Finance / Public finance / Tax

    PDF Document

    Add to Reading List

    Source URL: secure.tncountyclerk.com

    Language: English - Date: 2014-02-28 15:17:00
    143Secure state / Multics / Ring / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

    A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 18:59:56
    144Employment compensation / Internal Revenue Code / Pension / 401 / Defined benefit pension plan / 403 / Defined contribution plan / Employee Retirement Income Security Act / Employee benefit / Investment / Financial economics / Economics

    The Secure Annuities for Employee (SAFE) Retirement Act of 2013 TITLE I - PUBLIC PENSION REFORM A “SAFE Retirement Plan” for State and Local Governments. State and local governments may adopt a SAFE Retirement Plan.

    Add to Reading List

    Source URL: www.americanbenefitscouncil.org

    Language: English - Date: 2014-02-20 18:33:09
    145Telecommunications engineering / Sensor node / International Conference on Information Processing in Sensor Networks / TinyOS / Conference on Embedded Networked Sensor Systems / Crossbow Technology / ANT / Wireless sensor network / Technology / Computing

    Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge (Demo Abstract) An Liu, Young-Hyun Oh, Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State Universit

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:16
    146Backup software / Disk cloning / System software / Acronis Secure Zone / Acronis / Backup / File system / Ext3 / Acronis True Image / Computing / Disk file systems / Software

    DATASHEET ACRONIS® BACKUP FOR LINUX® SERVER BEST BACKUP FOR LAPTOPS AND DESKTOPS Acronis Backup for Linux Server is built around state-of-the-art imaging technology, allowing you to create a disk-image

    Add to Reading List

    Source URL: acronis.cz

    Language: English - Date: 2014-09-26 07:29:34
    147Customs services / Radio-frequency identification / Public Printer of the United States / U.S. Customs and Border Protection / Secure Electronic Network for Travelers Rapid Inspection / Credential / Border Crossing Card / Political geography / Government / United States Government Printing Office / Technology

    GAO-15-326R, Government Publishing Office: Production of Secure Credentials for the Department of State and U.S. Customs and Border Protection

    Add to Reading List

    Source URL: www.gao.gov.

    Language: English - Date: 2015-03-10 15:15:27
    148Open standard / Know-how / Patent / Royalties / Intellectual property law / Law / Secure Digital

    SD CARD ASSOCIATION INTELLECTUAL PROPERTY POLICY This Intellectual Property Policy ("IP Policy") is designed to state clearly the expectation of the SD Card Association ("SDA"), with regard to any individual member compa

    Add to Reading List

    Source URL: www.sdcard.org

    Language: English - Date: 2014-08-11 05:15:00
    149Open standard / Know-how / Patent / Royalties / Intellectual property law / Law / Secure Digital

    SD CARD ASSOCIATION INTELLECTUAL PROPERTY POLICY This Intellectual Property Policy ("IP Policy") is designed to state clearly the expectation of the SD Card Association ("SDA"), with regard to any individual member compa

    Add to Reading List

    Source URL: www.sdcard.org

    Language: English - Date: 2014-08-11 05:15:00
    150Beacon / Wireless sensor network

    Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks∗ Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:08
    UPDATE