Skip to main content

Search results for "secondary containment"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 201 results by relevance

Critical Issues in NASA Information Systems: Final Report to the National Aeronautics and Space Administration  (1987)

Consensus Study Report

Computer Assisted Modeling: Contributions of Computational Approaches to Elucidating Macromolecular Structure and Function  (1987)

Proceedings

Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers  (2003)

Protecting Individual Privacy in Evaluation Research  (1975)

Proceedings

Computers, Communications, and Public Policy: Report of a Workshop at Woods Hole, Massachusetts, August 14-18, 1978  (1981)

Consensus Study Report

Trust in Cyberspace  (1999)

Consensus Study Report

Avoiding Surprise in an Era of Global Technology Advances  (2005)

Fostering Research on the Economic and Social Impacts of Information Technology  (1998)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

The Unpredictable Certainty: White Papers  (1997)

Consensus Study Report

Wireless Technology Prospects and Policy Options  (2011)

Location Data in the Context of Public Health, Research, and Law Enforcement: An Exploration of Governance Frameworks: Proceedings of a Workshop—in Brief  (2022)

Proceedings

Summary of a Workshop on Software Certification and Dependability  (2004)

Consensus Study Report

Information Technology Innovation: Resurgence, Confluence, and Continuing Impact  (2020)

Consensus Study Report

Report of the Committee on Proposal Evaluation for Allocation of Supercomputing Time for the Study of Molecular Dynamics: Eighth Round  (2017)

Consensus Study Report

Report of the Committee on Proposal Evaluation for Allocation of Supercomputing Time for the Study of Molecular Dynamics: Ninth Round  (2018)

Proceedings

The Socioeconomic Effects of Public Sector Information on Digital Networks: Toward a Better Understanding of Different Access and Reuse Policies: Workshop Summary  (2009)