- Abilene
- Able Danger
- Abnormal termination
- Abort
- AboutTheData.com
- About box
- About the NITRD Program: National Cyber Leap Year
- Above-890 ruling
- Above-the-line costs
- Above the fold
- Abridged Index Medicus via the Teletypewriter Exchange Network
- Abridgement
- Abrogation
- Absolute address
- Absolute altitude
- Absolute device
- Absolute link
- Absolute location
- Absolute novelty
- Absolute risk
- Absorption
- Absorptive capacity
- Abstention
- Abstract
- Abstract Communication Service Interface
- Abstract idea
- Abstract of the disclosure
- Abstraction
- Abuse of discretion
- Abuse of dominant position
- Abuse of functionality
- Abuse of privilege
- Abuse of process
- Abuse team
- Academia
- Academic and Research Network of Slovenia
- Academy of Certified Archivists
- Academy of Interactive Arts & Sciences
- Accelerated Mobile Pages
- Accelerated Strategic Computing Initiative
- Accelerating Technology Transfer and Commercialization of Federal Research in Support of High-Growth Businesses
- Acceleration
- Accelerator
- Accelerometer
- Accent mark
- Accept a certificate
- Acceptable Identification of Goods and Services Manual
- Acceptable interruption window
- Acceptable level of risk
- Acceptable quality level
- Acceptable risk
- Acceptable technology
- Acceptable use policy
- Acceptance
- Acceptance criteria
- Acceptance inspection
- Acceptance test
- Acceptance test plan
- Acceptance testing
- Accepted interference
- Acceptor
- Access
- Access-Control-as-a-Service
- AccessNow.org
- Access (organization)
- Access America
- Access America: Reengineering Through Information Technology
- Access BPL
- Access Certificate for Electronic Services
- Access Control Decision Function
- Access Control Decision Information
- Access Control Enforcement Function
- Access Control Policy Testing Tool
- Access Directive
- Access ISP
- Access National Agency Check with Inquiries
- Access Now v. Southwest Airlines
- Access Overload Control
- Access Policy Group
- Access With Trust
- Access agent
- Access agreement
- Access approval
- Access attempt
- Access authority
- Access authorization
- Access card
- Access category
- Access charge
- Access charge decision
- Access code
- Access contract
- Access control
- Access control card
- Access control center
- Access control check
- Access control function
- Access control information
- Access control label
- Access control list
- Access control measures
- Access control mechanisms
- Access control policy
- Access control policy rules
- Access control procedures
- Access control roster
- Access control service
- Access control software
- Access control system
- Access control technologies
- Access control token
- Access copy
- Access cross domain solution
- Access device
- Access eligibility determination
- Access evaluation
- Access for interstate long-distance services
- Access level
- Access line
- Access list
- Access management
- Access master
- Access method
- Access minutes
- Access mode
- Access network
- Access node
- Access originator
- Access path
- Access path diagram
- Access period
- Access point
- Access port
- Access privilege
- Access privileges
- Access product
- Access profile
- Access provider
- Access rights
- Access service
- Access software
- Access software provider
- Access threat
- Access time
- Access to Archival Databases
- Access to Broadband Networks: The Net Neutrality Debate
- Access to Data Protection Remedies in EU Member States
- Access to Electronic Court Records-An Outline of Issues and Legal Analysis
- Access to Government Information In the United States: A Primer
- Access to Information Act
- Access to Knowledge
- Access to Knowledge Global Academy
- Access to Knowledge for Development Center
- Access to Research Data in the 21st Century: An Ongoing Dialogue Among Interested Parties
- Access to Social Media Usernames and Passwords
- Access to and Retention of Research Data Rights and Responsibilities
- Access to classified information
- Access to information
- Access type
- Accessibility
- Accessibility and Integrity of Networked Information Collections
- Accessibility in IT Procurement
- Accessibility of Rich Internet Applications
- Accessible Information on Development Activities Initiative
- Accessible Transportation Technologies Research Initiative
- Accessible record
- Accession
- Accessioned Records
- Accessioned record
- Accessory
- Accidental
- Accidental hazard
- Accidental threat
- Accolade v. Distinctive Software
- Accomplice liability
- Account
- Account-based system
- Account-to-Account Payment
- Account Takeover Task Force
- Account audit
- Account compromise
- Account data
- Account document
- Account fraud
- Account hijacking
- Account management
- Account of profits
- Account take over attack
- Accountability
- Accountability Principle
- Accountability and Control of Classified Laptop Computers
- Accountability information
- Accounting
- Accounting entry
- Accounting legend code
- Accounting system
- Accounts payable
- Accounts receivable
- Accreditation
- Accreditation authority
- Accreditation boundary
- Accreditation level
- Accredited Standards Committee
- Accredited Standards Committee X9
- Accredited standards development organization
- Accrediting authority
- Accretion
- Accrual accounting
- Accumulator
- Accuracy
- Accuracy control
- Accurate data
- Accurateness
- Accusystems v. Honeywell Information Systems
- Achievements and Next Steps: Towards Global Cyber-Security
- Achieving Legal and Business Order in Cyberspace
- Achte/Neunte Boll Kino Beteiligungs Gmbh & Co. v. Does 1-4,577
- Acknowledged Special Access Program
- Acknowledgement
- Acoustic
- Acoustic Intelligence
- Acoustic communications
- Acoustic conference room
- Acoustic coupler
- Acoustic emanation
- Acoustic fingerprinting
- Acoustic jamming
- Acoustic security
- Acoustic sensor
- Acoustic spectrum
- Acoustic warfare
- Acoustical security
- Acoustical surveillance
- Acoustics
- Acquiescence
- Acquired Rights Directive
- Acquired rights jurisdiction
- Acquirer
- Acquiring and Enforcing the Government's Rights in Technical Data and Computer Software Under Department of Defense Contracts
- Acquiring high tech crime tools
- Acquiring technical operator
- Acquisition
- Acquisition, development, and installation controls
- Acquisition.gov
- Acquisition Career Management Information System
- Acquisition Category
- Acquisition Committee for E-Gov
- Acquisition Decision Authority
- Acquisition Law Advisory Panel
- Acquisition Lifecycle Framework
- Acquisition Policy for Defense Business Systems
- Acquisition Reform: Obstacles to Implementing the Federal Acquisition Computer Network
- Acquisition Review Board
- Acquisition Streamlining and Standardization Information System
- Acquisition costs
- Acquisition device
- Acquisition life cycle
- Acquisition management
- Acquisition organization
- Acquisition planning
- Acquisition policy
- Acquisition process
- Acquisition program
- Acquisition program baseline
- Acquisition strategy
- Acquisition systems protection
- Acquisition team
- Acquisitions and Bibliographic Access Directorate
- Acquittal
- Acrobat
- Acronym
- Across-track scanner
- Act of 21 March 2007 on the Installation and Use of Surveillance Cameras
- Act of God
- Act of Mar. 26, 1964 National Security Agency - Personnel Security Procedures
- Act of War
- Act on the Protection of Privacy in Electronic Communications
- Act on the Protection of Privacy in Working Life
- Acting under color of law
- Action
- Action Fraud
- Action Plan for Critical Infrastructure
- Action button
- Action item status
Advertisement
34,539
pages
Local Sitemap
Advertisement