Literatura científica selecionada sobre o tema "Computers – Access control – United States"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Computers – Access control – United States".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Computers – Access control – United States"
Muellenbach, Joanne M. "Focused Bedside Education May Improve Engagement of Hospitalized Patients with Their Patient Portals." Evidence Based Library and Information Practice 15, no. 1 (2020): 251–53. http://dx.doi.org/10.18438/eblip29671.
Texto completo da fonteRosenbaum, S., A. Somodevilla, and M. Casoni. "Will EMTALA Be There for People With Pregnancy-related Emergencies?" Obstetric Anesthesia Digest 43, no. 3 (2023): 113–14. http://dx.doi.org/10.1097/01.aoa.0000946244.38317.d1.
Texto completo da fonteShu, Yingli, Quande Yuan, Wende Ke, and Lei Kou. "Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism." Electronics 11, no. 23 (2022): 3938. http://dx.doi.org/10.3390/electronics11233938.
Texto completo da fonteMurthy, Uday S. "Tampa Electronics: An Instructional Case in Computer-Assisted Fraud Examination." Issues in Accounting Education 25, no. 3 (2010): 547–52. http://dx.doi.org/10.2308/iace.2010.25.3.547.
Texto completo da fonteAgarwal, Pranay, Mohammedhusen Manekiya, Tahir Ahmad, et al. "A Survey on Citizens Broadband Radio Service (CBRS)." Electronics 11, no. 23 (2022): 3985. http://dx.doi.org/10.3390/electronics11233985.
Texto completo da fonteZelalem Jembre, Yalew, Woon-young Jung, Muhammad Attique, Rajib Paul, and Beomjoon Kim. "Mobile Broadband Performance Evaluation: Analysis of National Reports." Electronics 11, no. 3 (2022): 485. http://dx.doi.org/10.3390/electronics11030485.
Texto completo da fonteFatin, Firman Adi Nur, Mukhamad Nurkamid, Rizkysari Meimaharani, and Ahmad Bagus Maskula. "Real-Time Monitoring of Gas Fields: Prototype at Pt Gamma Energi Pratama Bogor." JURNAL TEKNIK INFORMATIKA 16, no. 1 (2023): 89–99. http://dx.doi.org/10.15408/jti.v16i1.31832.
Texto completo da fonteRavnyushkin, A. V. "The Legal Issues of Firearms Trafficking in the United States of America." Siberian Law Review 19, no. 4 (2023): 356–73. http://dx.doi.org/10.19073/2658-7602-2022-19-4-356-373.
Texto completo da fonteMayans, Dámaris. "Lexical Frequency in Heritage Speakers of Spanish." Lenguaje 50, no. 2 (2022): 225–45. http://dx.doi.org/10.25100/lenguaje.v50i2.11628.
Texto completo da fonteMcHugh, Douglas, Richard Feinn, Jeff McIlvenna, and Matt Trevithick. "A Random Controlled Trial to Examine the Efficacy of Blank Slate: A Novel Spaced Retrieval Tool with Real-Time Learning Analytics." Education Sciences 11, no. 3 (2021): 90. http://dx.doi.org/10.3390/educsci11030090.
Texto completo da fonteTeses / dissertações sobre o assunto "Computers – Access control – United States"
Dikmen, Iskender. "Border monitoring based on a novel PIR detection model." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FDikmen.pdf.
Texto completo da fonteLaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.
Texto completo da fonteLing, Meng-Chun. "Senior health care system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2785.
Texto completo da fonteHunt, Richard Reid. "Moving Beyond Regulatory Mechanisms| A Typology of Internet Control Regimes." Thesis, Portland State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1560952.
Texto completo da fonteSparrow, Alice Pickett 1939. "THE SOCIOLOGICAL IMPACT OF THE FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT ON AN INSTITUTION OF HIGHER EDUCATION." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275273.
Texto completo da fonteBerrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Texto completo da fonteLivros sobre o assunto "Computers – Access control – United States"
Brock, Jack L. Computer security: Hackers penetrate DOD computer systems : statement of Jack L. Brock, Jr., Director, Government Information and Financial Management, Information Management and Technology Division, before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate. U.S. General Accounting Office, 1991.
Encontre o texto completo da fonteOffice, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. U.S. G.P.O., 2001.
Encontre o texto completo da fonteUnited States. Department of Veterans Affairs. Office of Audits & Evaluations. Review of alleged unauthorized access to VA systems. Dept. of Veterans Affairs, Office of Inspector General, Office of Audits and Evaluations, 2011.
Encontre o texto completo da fonteUnited States. General Accounting Office, ed. FAA computer security: Actions needed to address critical weaknesses that jeopardize aviation operations : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives. The Office, 2000.
Encontre o texto completo da fonteOffice, General Accounting. Information systems: Veterans Administration information resources management is improving : report to congressional requesters. The Office, 1988.
Encontre o texto completo da fonteBrock, Jack L. Information security: Computer hacker information available on the Internet : statement for the record of Jack L. Brock, Jr., Director, Defense Information and Financial Management Systems, and Keith A. Rhodes, Technical Assistant Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. The Office, 1996.
Encontre o texto completo da fonteBrock, Jack L. Information security: Computer attacks at Department of Defense pose increasing risks : statement of Jack L. Brock, Director, Defense Information and Financial Management Systems, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. The Office, 1996.
Encontre o texto completo da fonteBrock, Jack L. Information security: Comments on the proposed Government Information Security Act of 1999 : statement of Jack L. Brock, Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate. The Office, 2000.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... U.S. G.P.O., 1988.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Computers – Access control – United States"
Joque, Justin. "Cyber-Catastrophe." In Pedagogies of Disaster. punctum books, 2013. https://doi.org/10.21983/p3.0050.1.32.
Texto completo da fonteKosseff, Jeff. "Anonymity as a Sword." In The United States of Anonymous. Cornell University Press, 2022. http://dx.doi.org/10.7591/cornell/9781501762383.003.0014.
Texto completo da fonteClayton, John F. "Education, the Internet, and the World Wide Web." In Encyclopedia of Human Computer Interaction. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.
Texto completo da fonteMarcelle, Gillian M. "A Feminist Agenda for Reducing the Gender Digital Divide." In Global Information Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch221.
Texto completo da fonteKetzan, Erik, and Paweł Kamocki. "Digital Humanities Research under United States and European Copyright Laws." In Access and Control in Digital Humanities. Routledge, 2021. http://dx.doi.org/10.4324/9780429259616-19.
Texto completo da fonteSundstrom, Beth, and Cara Delay. "How Do Attitudes and Policies Impact Access to Birth Control?" In Birth Control. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190069674.003.0006.
Texto completo da fonteMarkowitz, Jonathan N. "The United States’ Arctic Foreign Policy." In Perils of Plenty. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190078249.003.0006.
Texto completo da fonteHolden, Robert H. "Defining Collaboration: The United States and Central America." In Armies Without Nations. Oxford University PressNew York, NY, 2004. http://dx.doi.org/10.1093/oso/9780195161205.003.0010.
Texto completo da fontedeRosset, Leslie, Halle Neeley, and Aunchalee Palmquist. "Innovations in Virtual Care." In The Practical Playbook III. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780197662984.003.0038.
Texto completo da fontePartow-Navid, Parviz, and Ludwig Slusky. "IT Security Policy in Public Organizations." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch183.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Computers – Access control – United States"
Banerjee, Subharthi, Michael Hempel, Pejman Ghasemzadeh, Hamid Sharif, and Tarek Omar. "Wireless Communication for High-Speed Passenger Rail Services: A Study on the Design and Evaluation of a Unified Architecture." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8068.
Texto completo da fonteCarlson, Justin, Zachariah Tiberi, Mohsen Safaei, Robert I. Ponder, and Steven R. Anton. "Parametric Testing of Surrogate Knee Replacement Bearings With Embedded Piezoelectric Transducers." In ASME 2018 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/smasis2018-8037.
Texto completo da fonteAnderson, Gary L., and Devendra P. Garg. "Damping and Vibration Control via Nanoscale Technologies for Defense Oriented Applications." In ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/detc2003/vib-48536.
Texto completo da fonteZhao, Yixin, and Sara Behdad. "Electric Vehicle Battery Simulation: How Electrode Porosity and Thickness Impact Cost and Performance." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-71511.
Texto completo da fonteSong, Xubin, and Dongpu Cao. "Design of Semiactive Vehicle Suspension Controls in Frequency Domain." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86557.
Texto completo da fonteGray, Jeremy P., Vladimir V. Vantsevich, and Jim L. Overholt. "Indices and Computational Strategy for Unmanned Ground Wheeled Vehicle Mobility Estimation and Enhancement." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12158.
Texto completo da fonteHu, Yang, and Gaurav Ameta. "Life Cycle Assessment and Eco-Design of a Wireless TV/VCR Remote." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12484.
Texto completo da fonteJoshi, Rakesh, Nathan Bane, Justin Derickson, Mark E. Williams, and Abhijit Nagchaudhuri. "Preliminary Trial Results for the Redesigned STRIDER Platform With Sampling Capability From Different Depths." In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67385.
Texto completo da fonteWard, Jeffrey A., Joseph Hitt, Thomas Sugar, and Kartik Bharadwaj. "Dynamic Pace Controller for the Robotic Gait Trainer." In ASME 2006 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/detc2006-99733.
Texto completo da fonteShao, Guodong, Alexander Brodsky, Jorge Arinez, Daniel Menasce, and Paul Ammann. "A Decision-Guided Energy Management Framework for Sustainable Manufacturing." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-47454.
Texto completo da fonteRelatórios de organizações sobre o assunto "Computers – Access control – United States"
Gindi, Renee. Health, United States, 2019. Centers for Disease Control and Prevention (U.S.), 2021. http://dx.doi.org/10.15620/cdc:100685.
Texto completo da fonteYagci, Mustafa. Global Chip Shortage and Implications for Developing Countries. Islamic Development Bank Institute, 2022. http://dx.doi.org/10.55780/re24021.
Texto completo da fonteMinkanic, Michelle, and Emily Tran. Socioeconomic and Cultural Factors Influencing Type of Hormonal Contraceptive Use in Women in Developed vs Under-Developed Geographic Areas. Science Repository, 2024. http://dx.doi.org/10.31487/j.cei.2024.01.01.
Texto completo da fonteBurniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, 2015. http://dx.doi.org/10.54813/nrmd2833.
Texto completo da fonteBourrier, Mathilde, Michael Deml, and Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, 2022. http://dx.doi.org/10.31265/usps.254.
Texto completo da fonteWhelan, Kevin, and Wendy Wright. Protocol implementation plan for monitoring mangrove soil surface elevation tables in South Florida / Caribbean Network parks. National Park Service, 2016. https://doi.org/10.36967/2230638.
Texto completo da fonteStrengthening recovery actions for Southern Resident killer whales. Raincoast Conservation Foundation, 2025. https://doi.org/10.70766/32.7300.
Texto completo da fonte