Search

Your search keyword '"Access Control"' showing total 1,446 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Region united states Remove constraint Region: united states
1,446 results on '"Access Control"'

Search Results

1. Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism.

2. An exploratory study of failed mass shootings in America.

3. Lethal school violence in Scandinavia: development of an incident typology and suggestions for prevention.

4. DNSSEC: A PROTOCOL TOWARD SECURING THE INTERNET INFRASTRUCTURE.

5. CALCULATING ERROR RATES FOR FILTERING SOFTWARE.

6. Toward a Positive Security Program.

7. Hunting the Hackers.

8. Correlates of Access to Business Research Databases.

9. Why the Anticircumvention Regulations Need Revision.

10. THE NEED FOR SPEED.

11. I GOT 99 PROBLEMS AND A WARRANT IS ONE: HOW CURRENT INTERPRETATIONS OF THE STORED COMMUNICATIONS ACT OFFEND INTERNATIONAL COMITY.

12. WHOSE CABLES ARE THEY?

13. Filling the Need for Speed.

14. CAN TECHNOLOGY PREVENT LEAKS?

15. Evaluating access control of open source electronic health record systems.

16. Information assurance (IA).

17. Access Control Goes To High School.

18. Mental Health Privacy.

19. Grading for Safety.

20. DIGITAL INNOCENCE.

21. MENTAL HEALTH RECORDS: "To See or Not to See? That Is the Question!".

22. Intellectual freedom legislation: The state of the states

23. TO ENSURE A SAFE HAVEN.

24. THE BEST DEFENSE.

25. Security and communication improve community trust.

26. New technology “clouds” student data privacy.

27. Parents need access to education data — and need to know it’s secure.

28. MUG SHOT DISCLOSURE UNDER FOIA: DOES PRIVACY OR PUBLIC INTEREST PREVAIL?

29. THE MUGSHOT INDUSTRY: FREEDOM OF SPEECH, RIGHTS OF PUBLICITY, AND THE CONTROVERSY SPARKED BY AN UNUSUAL NEW TYPE OF BUSINESS.

30. Partners in Collaborative Cataloging: The U.S. Government Printing Office and the University of Montana.

31. CONSIDERING COPYRIGHT RULEMAKING: THE CONSTITUTIONAL QUESTION.

32. Mitigating Risks Associated with Transitive Trust in Service-Based Identity Propagation.

33. REFORMING THE PATENT ACT TO ACCOMMODATE BIOTECHNOLOGY: BALANCING DSINOVATION WITH PUBLIC ACCESS.

34. Protection of defensive computer network systems.

35. E-discovery and its global implications.

36. THE ATTORNEY-CLIENT PRIVILEGE AND DISCOVERY OF ELECTRONICALLY STORED INFORMATION.

37. Social Networking and Workers' Compensation Law at the Crossroads.

38. Shared Digital Access and Preservation Strategies for Serials at the Center for Research Libraries.

39. Open Access Journals in College Library Collections.

40. FILING GUIDE.

41. Dirty Digits.

42. THE ARTFUL DODGER: RESPONDING PARTIES' ABILITY TO AVOID ELECTRONIC DISCOVERY COSTS UNDER 26(b)(2)(B) AND 26(b)(2)(C) AND THE PRESERVATION OBLIGATION.

43. Corporate America Needs Help with Collecting Electronically Stored Information: ASCLD/LAB International Should be Their Guide.

44. Policy-based spectrum access control for dynamic spectrum access network radios.

45. Council Minutes.

46. ACCESS TO CONTRACEPTION.

47. FERPA IN THE TWENTY-FIRST CENTURY: FAILURE TO EFFECTIVELY REGULATE PRIVACY FOR ALL STUDENTS.

48. DECREASING THE ACCESSIBILITY TO CRIMINAL HISTORY RECORDS TO DIMINISH THE DEVASTATING IMPACTS OF COLLATERAL EFFECTS ON AFRICAN AMERICANS IN MINNESOTA.

49. Information Security Implications of Sarbanes-Oxley.

50. BARRIERS TO THE VOLUNTARY ADOPTION OF INTERNET TAGGING PROPOSALS.

Catalog

Books, media, physical & digital resources