Search

Your search keyword '"UNAUTHORIZED use"' showing total 123 results

Search Constraints

Start Over You searched for: Descriptor "UNAUTHORIZED use" Remove constraint Descriptor: "UNAUTHORIZED use" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
123 results on '"UNAUTHORIZED use"'

Search Results

1. Firearm Storage Behaviors — Behavioral Risk Factor Surveillance System, Eight States, 2021–2022.

2. TAKE A PICTURE: COPYRIGHT AND STATE SOVEREIGN IMMUNITY.

3. OPERA ŞI SUPORTUL SĂU. PRIVIRE ASUPRA (LICENȚIERII) PROGRAMELOR PENTRU CALCULATOR.

4. Command and Control of India’s Nuclear Arsenal

5. Tennyson's Proof Copies Rejected by the Turkish Bureaucracy.

7. Elements to be established by brand owners seeking redress in court for trademark infringement on social media sites.

8. ARTICLE THREE Rights and Responsibilities of RDFIs and Their Receivers: SECTION 3.12 Written Statement of Unauthorized Debit.

9. CRIMINAL TRESPASS AND COMPUTER CRIME.

10. Available, Granted, Revoked: A New Framework for Assessing Unauthorized Access Under the Computer Fraud and Abuse Act.

11. THE USE OF DEAD CELEBRITIES IN ADVERTISING AND MARKETING.

12. A LONGITUDINAL STUDY OF UNAUTHORIZED ACCESS ATTEMPTS ON INFORMATION SYSTEMS: THE ROLE OF OPPORTUNITY CONTEXTS.

13. Toward the Personalization of Copyright Law.

14. Byrd v United States: Unauthorized Drivers of Rental Cars Have Fourth Amendment Rights? Not as Evident as It Seems.

15. Nacha Board of Directors Policy Statements: Nacha Board of Directors Interim Policy Statement on ACH Data Breach Notification Requirements.

16. 電信法第56條第一項刑罰規定之適用問題研究 The Issues on the Application of

17. OBJECTIVE FACTOR OF FURTUM: CONTRECTATIO.

18. Unauthorized Access to Computerized Information.

19. Novel assessment method for accessing private data in social network security services.

20. An Intelligent Access Control System Based on Passive Radio-Frequency Identification.

21. A Proposed Amendment to 18 U.S.C. § 1030--The Problem of Employee Theft.

22. Authority and Authors and Codes.

23. Measuring Computer Use Norms.

24. Consenting to Computer Use.

25. A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act.

26. Generating a Corpus of Mobile Forensic Images for Masquerading user Experimentation.

27. FAIR USE OF FOUL BALLS: MAJOR LEAGUE BASEBALL ADVANCED MEDIA AND ITS COUNTERPRODUCTIVE TAKEDOWN NOTICES TO FANS.

28. PROBLEMS OF UNAUTHORIZED INTERFERENCE TO THE WORK OF UAV AND METHODS OF ITS SOLVING.

29. Groundwater use in Spain: an overview in light of the EU Water Framework Directive.

30. The fault of trespass.

31. A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.

32. Lightweight secure storage model with fault-tolerance in cloud environment.

33. Role Refinement in Access Control: Model and Analysis.

34. BRIGHT LIGHTS, BRIGHT-LINE: TOWARD SEPARATION AND REFORMATION OF THE TRANSFORMATIVE USE ANALYSIS.

35. Using text models in navigation.

36. Cannabis for therapeutic purposes: Patient characteristics, access, and reasons for use.

37. Furtum and manus / potestas.

38. ARTICLE ONE General Rules: SECTION 1.11 Unauthorized Entry Fee.

39. Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism.

40. Oblivious access control policies for cloud based data sharing systems.

41. Intelligence Secrets and Unauthorized Disclosures: Confronting Some Fundamental Issues.

42. REDUCING UNAUTHORIZED DIGITAL DOWNLOADING OF MUSIC BY OBTAINING VOLUNTARY COMPLIANCE WITH COPYRIGHT LAW THROUGH THE REMOVAL OF CORPORATE POWER IN THE RECORDING INDUSTRY.

43. Too Hot to Cybersquat: How Franchisors Can Use the Anticybersquatting Consumer Protection Act.

44. VULNERABLE SOFTWARE: PRODUCT-RISK NORMS AND THE PROBLEM OF UNAUTHORIZED ACCESS.

45. RUNNING ON EMPTY: THE PROBLEM WITH POLITICIANS AND STEALING (MUSIC).

46. A new look at software piracy: Soft lifting primes an inauthentic sense of self, prompting further unethical behavior

47. Elder Financial Abuse in the News.

48. The Gendered Dimensions of Sexting: Assessing the Applicability of Canada's Child Pornography Provision.

49. Issues of Digital Data Security in Library Environment.

50. COMMERCIAL OR ADVERTISING PURPOSE UNDER FLORIDA STATUTES SECTION 540.08 DEMYSTIFIED.

Catalog

Books, media, physical & digital resources