Search

Your search keyword '"UNAUTHORIZED use"' showing total 345 results

Search Constraints

Start Over You searched for: Descriptor "UNAUTHORIZED use" Remove constraint Descriptor: "UNAUTHORIZED use" Language english Remove constraint Language: english
345 results on '"UNAUTHORIZED use"'

Search Results

1. Firearm Storage Behaviors — Behavioral Risk Factor Surveillance System, Eight States, 2021–2022.

2. TAKE A PICTURE: COPYRIGHT AND STATE SOVEREIGN IMMUNITY.

3. Chaining Electronic Seals : An eIDAS Compliant Framework for Controlling SSCD

4. Automating Visual Privacy Protection Using a Smart LED.

5. JUST FOUND OUT YOUR BOOK WAS USED TO TRAIN AI. NOW WHAT? Practical Tips for Authors to Protect Their Works from AI Use.

6. Command and Control of India’s Nuclear Arsenal

7. Tennyson's Proof Copies Rejected by the Turkish Bureaucracy.

9. Elements to be established by brand owners seeking redress in court for trademark infringement on social media sites.

10. ARTICLE THREE Rights and Responsibilities of RDFIs and Their Receivers: SECTION 3.12 Written Statement of Unauthorized Debit.

11. CRIMINAL TRESPASS AND COMPUTER CRIME.

12. Available, Granted, Revoked: A New Framework for Assessing Unauthorized Access Under the Computer Fraud and Abuse Act.

13. Management Report: Improvements Needed in IRS's Financial Reporting and Information System Controls.

14. THE USE OF DEAD CELEBRITIES IN ADVERTISING AND MARKETING.

15. A LONGITUDINAL STUDY OF UNAUTHORIZED ACCESS ATTEMPTS ON INFORMATION SYSTEMS: THE ROLE OF OPPORTUNITY CONTEXTS.

16. Toward the Personalization of Copyright Law.

17. Byrd v United States: Unauthorized Drivers of Rental Cars Have Fourth Amendment Rights? Not as Evident as It Seems.

18. Nacha Board of Directors Policy Statements: Nacha Board of Directors Interim Policy Statement on ACH Data Breach Notification Requirements.

19. HubSpot reports nearly 50 customer accounts compromised.

20. OBJECTIVE FACTOR OF FURTUM: CONTRECTATIO.

21. Unauthorized Access to Computerized Information.

22. Novel assessment method for accessing private data in social network security services.

23. An Intelligent Access Control System Based on Passive Radio-Frequency Identification.

24. A Proposed Amendment to 18 U.S.C. § 1030--The Problem of Employee Theft.

25. Authority and Authors and Codes.

26. Measuring Computer Use Norms.

27. Consenting to Computer Use.

28. A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act.

29. Generating a Corpus of Mobile Forensic Images for Masquerading user Experimentation.

30. Command and Control of India’s Nuclear Arsenal

31. FAIR USE OF FOUL BALLS: MAJOR LEAGUE BASEBALL ADVANCED MEDIA AND ITS COUNTERPRODUCTIVE TAKEDOWN NOTICES TO FANS.

32. PROBLEMS OF UNAUTHORIZED INTERFERENCE TO THE WORK OF UAV AND METHODS OF ITS SOLVING.

33. Groundwater use in Spain: an overview in light of the EU Water Framework Directive.

35. Trademark Enforcement and Internet Search Advertising: A Regulatory Risk for Brand Owners.

36. The fault of trespass.

37. A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.

38. Lightweight secure storage model with fault-tolerance in cloud environment.

39. Part 2: Copyright Law.

40. Part 2: Copyright Law.

41. Electronic security.

42. Role Refinement in Access Control: Model and Analysis.

43. BRIGHT LIGHTS, BRIGHT-LINE: TOWARD SEPARATION AND REFORMATION OF THE TRANSFORMATIVE USE ANALYSIS.

44. Using text models in navigation.

45. Attributes of the Criminal Copyright Infringement Phenomenon

46. Cannabis for therapeutic purposes: Patient characteristics, access, and reasons for use.

47. Furtum and manus / potestas.

49. ARTICLE ONE General Rules: SECTION 1.11 Unauthorized Entry Fee.

50. Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.

Catalog

Books, media, physical & digital resources