Skip to main content

Search results for "firearm gunshot"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 18 of 18 results by relevance
Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Consensus Study Report

Wireless Technology Prospects and Policy Options  (2011)

Consensus Study Report

Review of Three Divisions of the Information Technology Laboratory at the National Institute of Standards and Technology: Fiscal Year 2015  (2015)

Cryptography's Role in Securing the Information Society  (1996)

Consensus Study Report

Advancing Commercialization of Digital Products from Federal Laboratories  (2021)

Consensus Study Report

Health Data in the Information Age: Use, Disclosure, and Privacy  (1994)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures  (2011)

Electronic Brains: Stories from the Dawn of the Computer Age  (2005)

Proceedings

For Attribution: Developing Data Attribution and Citation Practices and Standards: Summary of an International Workshop  (2012)

Proceedings

Communications and Technology for Violence Prevention: Workshop Summary  (2012)

Consensus Study Report

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance  (2024)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Proceedings

Innovative Flanders: Innovation Policies for the 21st Century: Report of a Symposium  (2008)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)