×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [cyber environment]
Documents
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications
218 views
Documents
Detecting Nearly Duplicated Records in Location Datasets Microsoft Research Asia Search Technology Center Yu Zheng Xing Xie, Shuang Peng, James Fu
220 views
Documents
© 2011 SELEX Sistemi Integrati - Commercial in Confidence Massimo Scipioni TRUST Autumn Conference 2011 Realizing intrinsically cyber secure large systems
220 views
Documents
Integration of Library Resources in the Development of the University Portal Eva Wong Run Run Shaw Library City University of Hong Kong HKIUG December
214 views
Documents
I*EARN in Taiwan Sylvia Li
[email protected]
jinglu
217 views
Documents
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order 13636 “Improving Critical Infrastructure Cybersecurity”
225 views
Documents
1. European Council on Defence, December 2013 Lisbon Treaty Common Security and Defence Policy Hellenic Presidency Priorities on Defence 2
217 views
Documents
1 Presentation at Short courses on key international economic issues Geneva, 14 May 2012 Cécile Barayre Economic Affairs Officer, ICT Analysis Section,
216 views
Documents
LIBRARIES IN THE PRESENT ERA: IS INTERNET A SUBSTITUTE FOR LIBRARIES ? Sangita Gupta Professor, DLIS University of Jammu Jammu
215 views
Documents
Cyber Education: A Multi-Level, Multi-Discipline Approach Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor United States Military
224 views
Documents
Detecting Nearly Duplicated Records in Location Datasets
31 views
Documents
Opening Remarks
48 views
< Prev
Next >