- Acquisition
- Acquisition, development, and installation controls
- Acquisition.gov
- Acquisition Career Management Information System
- Acquisition Category
- Acquisition Committee for E-Gov
- Acquisition Decision Authority
- Acquisition Law Advisory Panel
- Acquisition Lifecycle Framework
- Acquisition Policy for Defense Business Systems
- Acquisition Reform: Obstacles to Implementing the Federal Acquisition Computer Network
- Acquisition Review Board
- Acquisition Streamlining and Standardization Information System
- Acquisition costs
- Acquisition device
- Acquisition life cycle
- Acquisition management
- Acquisition organization
- Acquisition planning
- Acquisition policy
- Acquisition process
- Acquisition program
- Acquisition program baseline
- Acquisition strategy
- Acquisition systems protection
- Acquisition team
- Acquisitions and Bibliographic Access Directorate
- Acquittal
- Acrobat
- Acronym
- Across-track scanner
- Act of 21 March 2007 on the Installation and Use of Surveillance Cameras
- Act of God
- Act of Mar. 26, 1964 National Security Agency - Personnel Security Procedures
- Act of War
- Act on the Protection of Privacy in Electronic Communications
- Act on the Protection of Privacy in Working Life
- Acting under color of law
- Action
- Action Fraud
- Action Plan for Critical Infrastructure
- Action button
- Action item status
- Action lists
- Action plan
- Action plan for implementing the legal framework for electronic public procurement
- Actionable
- Actionable information
- Actionable intelligence
- Actionable knowledge
- Actions to Strengthen Cybersecurity and Protect Critical IT Systems
- Activate
- Activated channels
- Activation
- Activation data
- ActiveX
- Active Directory
- Active Network Intrusion Defense
- Active RFID
- Active attack
- Active communications satellite
- Active consent
- Active content
- Active critical data
- Active cyber defence
- Active data collection
- Active data warehouse
- Active deception
- Active defense
- Active device
- Active electronic countermeasures
- Active electronic protective measures
- Active information
- Active infrared sensor
- Active knowledge system
- Active learning
- Active license
- Active measurement tool
- Active pervasive attack
- Active record
- Active remote sensing
- Active safety system
- Active satellite
- Active security testing
- Active sensor
- Active server page
- Active state
- Active surveillance
- Active tag
- Active threat
- Active window
- Active wiretapping
- Activism
- Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy
- Activities
- Activity, Recognition and Monitoring
- Activity-based intelligence
- Activity Security Manager
- Activity monitor
- Activity security manager
- Actmedia v. Active Media International
- Actor
- Actors, Technologies, Threats, Challenges, and Assessments in Cyberspace
- Actual Cost of Work Performed
- Actual authority
- Actual capacity
- Actual cost
- Actual damages
- Actual knowledge
- Actual malice
- Actual reduction to practice
- Actual speed
- Actual state
- Actuating capability
- Actuator
- Actus reus
- Ad
- Ad-hoc mode
- Ad-supported
- AdCenter
- AdSense
- AdWords
- Ad Delivery and Reporting
- Ad Hoc 206
- Ad Hoc HIE
- Ad Hoc Working Group on Informatics
- Ad blocker
- Ad blocking
- Ad exchange
- Ad hoc
- Ad hoc Committee on Data Protection
- Ad hoc Committee on e-democracy
- Ad hoc Group of Experts on Cryptography Policy Guidelines
- Ad hoc network
- Ad infinitum
- Ad inventory
- Ad network
- Ad server
- Ad space
- Ad tags
- Ad tech
- Ad tech stack
- Ad unit
- Ad valorem
- Ad verification
- Ada Lovelace Institute
- Adam Walsh Child Protection and Safety Act of 2006
- Adams v. Dan River Mills
- Adaptability
- Adaptation
- Adaptive
- Adaptive Planning and Execution system
- Adaptive branding
- Adaptive capacity
- Adaptive cruise control
- Adaptive engineering
- Adaptive keyboard
- Adaptive learning
- Adaptive learning system
- Adaptive maintenance
- Adaptive neural network
- Adaptive radio
- Adaptive risk
- Adaptive robot
- Adaptive routing
- Adaptive system
- Adaptive threat
- Add-in
- Add-in card
- Add-on
- Add-on security
- Add Grace Period
- Addamax v. Open Software Foundation
- Addendum
- Addition method VAT
- Additional Large-Scale Computer System Not Needed by the Bureau of the Census
- Additional Protocol to the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data regarding supervisory authorities and transborder data flows
- Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems
- Additional resource costs
- Additive Manufacturing Consortium
- Additive Manufacturing Users Group
- Additive Manufacturing in 2040: Powerful Enabler, Disruptive Threat
- Additive manufacturing
- Additive manufacturing file format
- Address
- Address Supporting Organization
- Address bar spoofing
- Address book
- Address box
- Address bus
- Address data
- Address data format
- Address element
- Address field
- Address format
- Address hygiene
- Address matching
- Address munging
- Address of record
- Address poisoning
- Address resolution
- Address resolution protocol
- Address space layout randomization
- Address verification system
- Addressability
- Addressable TV advertising
- Addressable television advertising
- Addressee
- Addressing Disputes in Electronic Commerce
- Addressing Export Control in the Age of Cloud Computing
- Adequacy
- Adequate assurances
- Adequate disclosure
- Adequate remedy at law
- Adequate security
- Adhesion contract
- Adiabatic quantum computing
- Adjacent band interference
- Adjudication
- Adjudication authority
- Adjudicative process
- Adjudicator
- Adjusted Peak Performance
- Administración Nacional de Telecomunicaciones
- Administration's White Paper on Intellectual Property Enforcement Legislative Recommendations
- Administration-to-business
- Administration Strategy on Mitigating the Theft of U.S. Trade Secrets
- Administrative Assistant to the Secretary of the Army
- Administrative Contracting Officer
- Administrative Domain
- Administrative Law Division, Office of General Counsel
- Administrative Measures for the Graded Protection of Information Security
- Administrative Procedure Act
- Administrative access
- Administrative account
- Administrative alert
- Administrative analysis
- Administrative control
- Administrative data
- Administrative expense
- Administrative incident
- Administrative law
- Administrative law judge
- Administrative metadata
- Administrative privileges
- Administrative record
- Administrative records
- Administrative safeguards
- Administrative search
- Administrative security
- Administrative simplification
- Administrative subpoena
- Administrative summons
- Administrative vulnerability
- Administratively restricted information
- Administrator
- Administrator privileges
- Administrator rights
- Admissible evidence
- Admongo
- Adobe Shockwave
- Adobe Systems v. Brenengen d/b/a/ Software Exchange
- Adobe Systems v. Stargate Software
- Adobe v. Canus
- Adobe v. One Stop Micro
- Adolescent
- Adopted Regulations for Testing of Autonomous Vehicles by Manufacturers
- Adopting and Adapting: States and Automated Vehicle Policy
- Adoption of Recommendations in Report of Commission on New Technological Uses of Copyrighted Works
- Adult
- Adult Labeling Rule
- Adult Literacy and New Technologies: Tools for a Lifetime
- Adult content
- Advance
- Advance Fee Fraud Coalition
- Advance Magazine Publishers v. Vogue
- Advance against royalties
- Advance fee fraud
- Advance force operations
- Advance payment
- Advance pricing
- Advance royalty
- Advance shipping notice
- Advanced Access Content Protection System
- Advanced Audio Coding
- Advanced Automation System
- Advanced Aviation Technology Directorate
- Advanced Battlespace Information System
- Advanced Biomedical Computing Center
- Advanced Communication Technology Satellite
- Advanced Communications Technologies and Services
- Advanced Computer Services v. MAI
Advertisement
34,539
pages
Local Sitemap
Advertisement