Skip to main content
Perhaps you meant guffaw handbook?

Search results for "ufaw handbook"

Filters: Information Security and Privacy Information Security and Privacy ×
Viewing 1 - 19 of 19 results by relevance

Scaling Up: A Research Agenda for Software Engineering  (1989)

Consensus Study Report

Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data  (2007)

Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures  (2011)

Consensus Study Report

Software for Dependable Systems: Sufficient Evidence?  (2007)

Consensus Study Report

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities  (2003)

Consensus Study Report

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues  (2014)

Consensus Study Report

Engaging Privacy and Information Technology in a Digital Age  (2007)

A Question of Balance: Private Rights and the Public Interest in Scientific and Technical Databases  (1999)

Consensus Study Report

Biometric Recognition: Challenges and Opportunities  (2010)

Proceedings

Borders, Cyber Resilience, and the Implications of Data Localization: Proceedings of a Workshop–in Brief  (2023)

Proceedings

Planning for Long-Term Use of Biomedical Data: Proceedings of a Workshop  (2020)

Proceedings

Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop  (2019)

Consensus Study Report

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance  (2024)

Proceedings

Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy  (2010)

Consensus Study Report

Toward a Safer and More Secure Cyberspace  (2007)

Consensus Study Report

Bits of Power: Issues in Global Access to Scientific Data  (1997)

Consensus Study Report

Expanding Access to Research Data: Reconciling Risks and Opportunities  (2005)

Consensus Study Report

Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment  (2008)

Consensus Study Report

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities  (2009)