2,281 results on '"EDWARDS, JOHN"'
Search Results
2. Privacy law reform - what it means for lawyers
3. A transport system to improve the wellbeing of all New Zealanders : the Transport Outcomes Framework
4. Protecting privacy in an un-private world
5. David C. Jones
6. Privacy in review
7. More sensors, more data: Big data tools improve GEOINT exploitation
8. Another view on early recollections of the DA locomotive
9. Unmanned vehicle operators require diversity of skills
10. NGA (National Geospatial Agency) follows a new road: Products are out, analysis is in, at the National Geospatial Agency
11. The balancing act: Developing identity and access management for a secure but usable
12. Navy picks 5 for CANES (Consolidated Afloat Networks and Enterprise Services): Next-generation afloat network gathers steam toward full operation
13. Using big data for real insight
14. Cross-domain GEOINT
15. Mission critical: Evolving threat environments increase pressure for seamless GEOINT sharing
16. Building special ops networks
17. A path to derived credentials: DOD rethinks its identity and access management strategy
18. Cyber strategies align
19. The insatiable appetite for bandwidth
20. Securing the commercial cloud
21. Operational Excellence: 7 Effizienzhebel für den IT-Betrieb
22. Ask me anything : new Privacy Commissioner John Edwards
23. Commissioner's mission : to make privacy 'easy'
24. A right to be forgotten for New Zealand?
25. When to hold 'em
26. The things we steal from children
27. Taming big data intel
28. Network visibility: The best way to defend netwoks is to have the ability to look into them
29. Maj. Gen. James 'Kevin' McLaughlin, Commander, 24th Air Force and Air Forces Cyber: interview
30. Leveraging advanced metering
31. Tough networks for tough missions
32. Managing GEOINT
33. Orville's aviators: Outstanding alumni of the Wright Flying School, 1910-1916
34. Searching for trouble
35. Legal consequences of mental illness
36. The Sutch files
37. Public registers and privacy
38. Anonymity of public servants
39. Privacy decision : a cause for alarm?
40. The OIA and commercial interests
41. Enterprise collaboration: DOD adopts unified IP-based strategy to stay ahead of cyber threats
42. Enterprise security: Single security architecture replacing defense in depth under JIE (joint information environment)
43. Emerging encryption tech: Mobile devices, big data drive the push for cutting-edge security
44. Rise of the machines
45. Birth of a new PC
46. The inevitability of blade
47. Learning from Napster
48. .Net gain?
49. LANS without lines
50. To InfiniBand and beyond
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.