FANDOM


All pages
"Black Boxes" in Passenger Vehicles: Policy Issues to 419 fraud
4D to AFSAC
AFSATCOM to ARB
ARC to A Special Inquiry Regarding the Accuracy of FBI Statements Concerni...
A State Cyber Hub Operations Framework to Acquiring and Enforcing the Government's Rights in Technical Data a...
Acquiring and Enforcing the Government’s Rights in Technical Data... to Advanced Biomedical Computing Center
Advanced Communication Technology Satellite to Air Traffic Control: Status of FAA's Host Computer Project and Rela...
Air and Marine Operations Surveillance System to Analog compression
Analog computer to Application programmer
Application programming to Asset
Asset management to Audit program
Audit record to Automated license plate recognition end-user
Automated license plate recognition information to BLS
BLSR to Battery-Assisted Passive Tag
Battery backup to Biological biometric characteristic
Biological data to Body-integrated technology
Body Area Network to Brooks Automatic Data Processing Act of 1965
Broussard v. Compulink to C3AG
C3CM to CERT-IST
CERT-IT to CMISE
CMMC to CSC v. Ferguson
CSD to Canada Interactive Fund
Canada International Internet Dispute Resolution Centre to Center for Information Systems Research
Center for Information Technology & Dispute Resolution to Chief security officer
Chief technology officer to Client-server
Client-server architecture to Collateral effect
Collateral estoppel to Common Entity Index Prototype
Common Gateway Interface to Compliance and Information Bureau
Compliance assessment to Computer cluster
Computer code to Confidentiality in the Face of Pervasive Surveillance: A Threat Mod...
Confidentiality level to Content information
Content injection attack to Copyright Policy, Creativity, and Innovation in the Digital Economy
Copyright Protection, Technological Change, and the Quality of New ... to Cover sheet
Coverage to Cross-Domain Situational Awareness
Cross-Jurisdictional Chief Information Officer Committee to Cyber Europe 2010
Cyber Europe 2012 to Cybersecurity: Agencies Need to Fully Establish Risk Management Pro...
Cybersecurity: Authoritative Reports and Resources to DCSS
DCSSI to DNS Sinkholing
DNS cache poisoning to Data-gathering
Data-in-motion to Data owner
Data packet to Dedicated network server
Dedicated path to Denying
Deoxyribonucleic acid to Dialing software
Dialog box to Digital labor
Digital law to Disclosed
Disclosing to DoD critical infrastructure security information
DoD imagery to Dyer v. Northwest Airlines
Dynabook to ECA
ECAC to ERLink
ERM to Eglen v. AOL
Egosurfer to Electronic deception
Electronic decision support system to Emulation
Emulator to Escalation management
Escalation procedure to Executive Order 12065
Executive Order 12131 to FARS
FAR System to FPKISC
FPKI MA to Fault management
Fault tolerance to Felony
Feltner v. Columbia Pictures Television to Fixed Price Contract with Prospective Price Redetermination
Fixed Price Economic Price Adjustment to Framework for National Information Infrastructure Services
Framework for Privacy Analysis of Programs, Technologies, and Appli... to GAO Reports - 1971
GAO Reports - 1972 to GSM Association
GSM Network and Switching Subsystem to Geoscience Australia
Geoscientific information to Goods
Goodwill to Group registration
Groupe Special Mobile to HSPD-6
HSPD-7 to Hex
Hexadecimal to Hostname lookup
Hostname lookup attack to ICANN gNSO
ICAO to INEW
INF to ISO 19770
ISO 20000 to Identity Management System
Identity Protection Personal Identification Number to In re Napster, Inc. Copyright Litigation
In re Naquin to Infocomm
Infocomm Development Authority to Information Technology: The World Wide Military Command and Control...
Information Technology: Tools and Techniques for Improving the Effi... to Informed communities
Informed consent to Integrity verification
Intel Corp. v. Hamidi to Interagency Council on Statistical Policy
Interagency Financial Institution Web Site Privacy Survey Report to International mobile equipment identity
International mobile subscriber identity to Internet standard
Internet surfer to JICPAC
JIE to Justifiable reliance
Justification to LAN adapter
LAP to Legacy IT system
Legacy computing system to Loading monitor
Loan Monitoring System: SBA Needs to Evaluate Use of Software to MBIE
MBR to MacNeil v. Trambert
Mac OS to Mapping the Global Legal Landscape of Blockchain Technologies
March Madness v. Netfire to Member of the public
Member state to Miniaturization
Miniaturization Technologies to Mod
Mod chip to Multispectral imagery
Multispectral imaging to NDBIF
NDC to NIST Special Publication 800-130
NIST Special Publication 800-131A to NSTAC Report to the President on the Internet of Things
NSTAC Report to the President on the National Coordinating Center to National Counterintelligence Center
National Counterintelligence Executive to National Public Safety Telecommunications Council
National Public Telecomputing Network to Net-centricity
Net2Phone v. Superior Court to Next Generation Internet
Next Generation Internet Initiative to Numerically-controlled
Numerically-controlled industrial equipment to OMB Memorandum M-11-33
OMB Memorandum M-12-08 to Office of Information Policy
Office of Information Practices to Online gaming
Online government services to Operations research
Operations security to PAGSI
PAHPA to PSAP
PSBL to Patent breadth
Patent claim to Personal Responsibility and Work Opportunity Reconciliation Act of ...
Personal access communications system to PlayStation 2
PlayStation Portable to Preexisting satellite digital audio radio service
Preexisting subscription service to Privacy Impact Assessment for the 24x7 Incident Handling and Respon...
Privacy Impact Assessment for the Arrival and Departure Information... to Product standard
Production to Proximity sensing
Proximity token to Quantum
Quantum Computing: Progress and Prospects to Racketeer
Racketeer Influenced and Corrupt Organizations Act to Recording
Recording Everything: Digital Storage as an Enabler of Authoritaria... to Remote driver
Remote exploit to Resource exhaustion attack
Resource management to Robotification
Robots to SEARCH, the Online Resource for Justice and Public Safety Decision ...
SEB to SSH
SSI to Scrape
Scraper to Security Incident Response Team
Security Industry Association to Sensitive but unclassified
Sensitive but unclassified information to Signatories
Signatory to Social Networking and Constituent Communications: Members' Use of T...
Social Responsibility Strategy to Space disaggregation
Space key to State, Local, Tribal, and Territorial Government Coordinating Council
State-of-the-art to Strategic assessment
Strategic assets to Surveillance Studies Centre
Surveillance and Broadcast Services Subsystem to TARS
TAS to Tactical data
Tactical data link to Telecom-ISAC
Telecom Control Commission to Test scenario
Test script to The Role of Scientific and Technical Data and Information in the Pu...
The Role of Trade Secrets in Innovation Policy to Tortious interference with contract
Tortious interference with contractual relations to Transponder
Transport to U.S. Code
U.S. Communications Intelligence Board to UN Global E-Government Survey 2005
UN Guidelines for the Regulation of Computerized Personal Data Files to Unilateral contract
Uninstall to User ID
User access to Verification and validation
Verification rate to Visualization process
Visualize to Want To Buy
Want To Sell to White House Summit on Cybersecurity and Consumer Protection
White Pages Concept to Workflow software
Workforce to Clear screen policy
Community content is available under CC-BY-SA unless otherwise noted.