Littérature scientifique sur le sujet « Computers – Access control – United States »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Computers – Access control – United States ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Computers – Access control – United States"
Muellenbach, Joanne M. « Focused Bedside Education May Improve Engagement of Hospitalized Patients with Their Patient Portals ». Evidence Based Library and Information Practice 15, no 1 (13 mars 2020) : 251–53. http://dx.doi.org/10.18438/eblip29671.
Texte intégralRosenbaum, S., A. Somodevilla et M. Casoni. « Will EMTALA Be There for People With Pregnancy-related Emergencies ? » Obstetric Anesthesia Digest 43, no 3 (23 août 2023) : 113–14. http://dx.doi.org/10.1097/01.aoa.0000946244.38317.d1.
Texte intégralShu, Yingli, Quande Yuan, Wende Ke et Lei Kou. « Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism ». Electronics 11, no 23 (28 novembre 2022) : 3938. http://dx.doi.org/10.3390/electronics11233938.
Texte intégralMurthy, Uday S. « Tampa Electronics : An Instructional Case in Computer-Assisted Fraud Examination ». Issues in Accounting Education 25, no 3 (1 août 2010) : 547–52. http://dx.doi.org/10.2308/iace.2010.25.3.547.
Texte intégralAgarwal, Pranay, Mohammedhusen Manekiya, Tahir Ahmad, Ashish Yadav, Abhinav Kumar, Massimo Donelli et Saurabh Tarun Mishra. « A Survey on Citizens Broadband Radio Service (CBRS) ». Electronics 11, no 23 (1 décembre 2022) : 3985. http://dx.doi.org/10.3390/electronics11233985.
Texte intégralZelalem Jembre, Yalew, Woon-young Jung, Muhammad Attique, Rajib Paul et Beomjoon Kim. « Mobile Broadband Performance Evaluation : Analysis of National Reports ». Electronics 11, no 3 (8 février 2022) : 485. http://dx.doi.org/10.3390/electronics11030485.
Texte intégralRavnyushkin, A. V. « The Legal Issues of Firearms Trafficking in the United States of America ». Siberian Law Review 19, no 4 (8 janvier 2023) : 356–73. http://dx.doi.org/10.19073/2658-7602-2022-19-4-356-373.
Texte intégralFatin, Firman Adi Nur, Mukhamad Nurkamid, Rizkysari Meimaharani et Ahmad Bagus Maskula. « Real-Time Monitoring of Gas Fields : Prototype at Pt Gamma Energi Pratama Bogor ». JURNAL TEKNIK INFORMATIKA 16, no 1 (28 mai 2023) : 89–99. http://dx.doi.org/10.15408/jti.v16i1.31832.
Texte intégralMayans, Dámaris. « Lexical Frequency in Heritage Speakers of Spanish ». Lenguaje 50, no 2 (27 juillet 2022) : 225–45. http://dx.doi.org/10.25100/lenguaje.v50i2.11628.
Texte intégralMcHugh, Douglas, Richard Feinn, Jeff McIlvenna et Matt Trevithick. « A Random Controlled Trial to Examine the Efficacy of Blank Slate : A Novel Spaced Retrieval Tool with Real-Time Learning Analytics ». Education Sciences 11, no 3 (25 février 2021) : 90. http://dx.doi.org/10.3390/educsci11030090.
Texte intégralThèses sur le sujet "Computers – Access control – United States"
Dikmen, Iskender. « Border monitoring based on a novel PIR detection model ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FDikmen.pdf.
Texte intégralThesis Advisor(s): Geoffrey Xie "March 2006." Includes bibliographical references (p. 49-50). Also available online.
LaMore, Robert L. « CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.
Texte intégralLing, Meng-Chun. « Senior health care system ». CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2785.
Texte intégralHunt, Richard Reid. « Moving Beyond Regulatory Mechanisms| A Typology of Internet Control Regimes ». Thesis, Portland State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1560952.
Texte intégralThis paper examines national Internet control from a policy regime perspective. The mechanisms through which governments attempt to control the Internet may be developed and implemented by different institutions and agencies, or fall outside of a formal regulatory structure entirely. As such, the totality of the institutions and practices of national Internet control is better conceptualized not as a regulatory regime, but as a control regime. After a survey of the critical policy and control dimensions, a six-part typology of control regimes is proposed. The purpose of this study and typology is exploratory. With comparative research about Internet control regimes at a relatively early stage, this paper aims to enable the formation of concepts and hypotheses about the interrelationship, or co-presence, of key distinguishing variables in different Internet control regimes.
Sparrow, Alice Pickett 1939. « THE SOCIOLOGICAL IMPACT OF THE FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT ON AN INSTITUTION OF HIGHER EDUCATION ». Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275273.
Texte intégralBerrios-Ayala, Mark. « Brave New World Reloaded : Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities ». Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Texte intégralB.S.
Bachelors
Health and Public Affairs
Legal Studies
Livres sur le sujet "Computers – Access control – United States"
Brock, Jack L. Computer security : Hackers penetrate DOD computer systems : statement of Jack L. Brock, Jr., Director, Government Information and Financial Management, Information Management and Technology Division, before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate. Washington, D.C : U.S. General Accounting Office, 1991.
Trouver le texte intégralOffice, General Accounting. Computer security : Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C : The Office, 1989.
Trouver le texte intégralUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection : The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington : U.S. G.P.O., 2001.
Trouver le texte intégralUnited States. Department of Veterans Affairs. Office of Audits & Evaluations. Review of alleged unauthorized access to VA systems. Washington, D.C : Dept. of Veterans Affairs, Office of Inspector General, Office of Audits and Evaluations, 2011.
Trouver le texte intégralUnited States. General Accounting Office, dir. FAA computer security : Actions needed to address critical weaknesses that jeopardize aviation operations : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives. Washington, D.C.] : The Office, 2000.
Trouver le texte intégralOffice, General Accounting. Information systems : Veterans Administration information resources management is improving : report to congressional requesters. Washington, D.C : The Office, 1988.
Trouver le texte intégralBrock, Jack L. Information security : Computer hacker information available on the Internet : statement for the record of Jack L. Brock, Jr., Director, Defense Information and Financial Management Systems, and Keith A. Rhodes, Technical Assistant Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C : The Office, 1996.
Trouver le texte intégralBrock, Jack L. Information security : Computer attacks at Department of Defense pose increasing risks : statement of Jack L. Brock, Director, Defense Information and Financial Management Systems, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C : The Office, 1996.
Trouver le texte intégralBrock, Jack L. Information security : Comments on the proposed Government Information Security Act of 1999 : statement of Jack L. Brock, Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate. [Washington, D.C.] : The Office, 2000.
Trouver le texte intégralUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987 : Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington : U.S. G.P.O., 1988.
Trouver le texte intégralChapitres de livres sur le sujet "Computers – Access control – United States"
Kosseff, Jeff. « Anonymity as a Sword ». Dans The United States of Anonymous, 214–32. Cornell University Press, 2022. http://dx.doi.org/10.7591/cornell/9781501762383.003.0014.
Texte intégralClayton, John F. « Education, the Internet, and the World Wide Web ». Dans Encyclopedia of Human Computer Interaction, 175–78. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.
Texte intégralKetzan, Erik, et Paweł Kamocki. « Digital Humanities Research under United States and European Copyright Laws ». Dans Access and Control in Digital Humanities, 233–48. Routledge, 2021. http://dx.doi.org/10.4324/9780429259616-19.
Texte intégralMarcelle, Gillian M. « A Feminist Agenda for Reducing the Gender Digital Divide ». Dans Global Information Technologies, 3126–48. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch221.
Texte intégralSundstrom, Beth, et Cara Delay. « How Do Attitudes and Policies Impact Access to Birth Control ? » Dans Birth Control. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190069674.003.0006.
Texte intégralMarkowitz, Jonathan N. « The United States’ Arctic Foreign Policy ». Dans Perils of Plenty, 125–53. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190078249.003.0006.
Texte intégralHolden, Robert H. « Defining Collaboration : The United States and Central America ». Dans Armies Without Nations, 119–33. Oxford University PressNew York, NY, 2004. http://dx.doi.org/10.1093/oso/9780195161205.003.0010.
Texte intégralPartow-Navid, Parviz, et Ludwig Slusky. « IT Security Policy in Public Organizations ». Dans Information Security and Ethics, 2745–54. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch183.
Texte intégralPinnolis, Judith S. « Jewish Music Sound-Recording Collections in the United States ». Dans The Oxford Handbook of Jewish Music Studies, 408–28. Oxford University Press, 2023. http://dx.doi.org/10.1093/oxfordhb/9780197528624.013.21.
Texte intégraldeRosset, Leslie, Halle Neeley et Aunchalee Palmquist. « Innovations in Virtual Care ». Dans The Practical Playbook III, 427–42. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780197662984.003.0038.
Texte intégralActes de conférences sur le sujet "Computers – Access control – United States"
Banerjee, Subharthi, Michael Hempel, Pejman Ghasemzadeh, Hamid Sharif et Tarek Omar. « Wireless Communication for High-Speed Passenger Rail Services : A Study on the Design and Evaluation of a Unified Architecture ». Dans 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8068.
Texte intégralCarlson, Justin, Zachariah Tiberi, Mohsen Safaei, Robert I. Ponder et Steven R. Anton. « Parametric Testing of Surrogate Knee Replacement Bearings With Embedded Piezoelectric Transducers ». Dans ASME 2018 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/smasis2018-8037.
Texte intégralAnderson, Gary L., et Devendra P. Garg. « Damping and Vibration Control via Nanoscale Technologies for Defense Oriented Applications ». Dans ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/detc2003/vib-48536.
Texte intégralZhao, Yixin, et Sara Behdad. « Electric Vehicle Battery Simulation : How Electrode Porosity and Thickness Impact Cost and Performance ». Dans ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-71511.
Texte intégralSong, Xubin, et Dongpu Cao. « Design of Semiactive Vehicle Suspension Controls in Frequency Domain ». Dans ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86557.
Texte intégralGray, Jeremy P., Vladimir V. Vantsevich et Jim L. Overholt. « Indices and Computational Strategy for Unmanned Ground Wheeled Vehicle Mobility Estimation and Enhancement ». Dans ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12158.
Texte intégralHu, Yang, et Gaurav Ameta. « Life Cycle Assessment and Eco-Design of a Wireless TV/VCR Remote ». Dans ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12484.
Texte intégralJoshi, Rakesh, Nathan Bane, Justin Derickson, Mark E. Williams et Abhijit Nagchaudhuri. « Preliminary Trial Results for the Redesigned STRIDER Platform With Sampling Capability From Different Depths ». Dans ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67385.
Texte intégralWard, Jeffrey A., Joseph Hitt, Thomas Sugar et Kartik Bharadwaj. « Dynamic Pace Controller for the Robotic Gait Trainer ». Dans ASME 2006 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/detc2006-99733.
Texte intégralShao, Guodong, Alexander Brodsky, Jorge Arinez, Daniel Menasce et Paul Ammann. « A Decision-Guided Energy Management Framework for Sustainable Manufacturing ». Dans ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-47454.
Texte intégralRapports d'organisations sur le sujet "Computers – Access control – United States"
Gindi, Renee. Health, United States, 2019. Centers for Disease Control and Prevention (U.S.), 2021. http://dx.doi.org/10.15620/cdc:100685.
Texte intégralMinkanic, Michelle, et Emily Tran. Socioeconomic and Cultural Factors Influencing Type of Hormonal Contraceptive Use in Women in Developed vs Under-Developed Geographic Areas. Science Repository, avril 2024. http://dx.doi.org/10.31487/j.cei.2024.01.01.
Texte intégralBurniske, Jessica, Dustin Lewis et Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action : A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, octobre 2015. http://dx.doi.org/10.54813/nrmd2833.
Texte intégralBourrier, Mathilde, Michael Deml et Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, novembre 2022. http://dx.doi.org/10.31265/usps.254.
Texte intégral