- Defining Homeland Security: Analysis and Congressional Considerations Analyst in Emergency Management and Homeland Security Policy
- Definite-quantity contract
- Definitions and Implementation Under the CAN-SPAM Act
- Definitization
- Deflation
- Deflection
- Defragmentation
- Degauss
- Degausser
- Degausser Product List
- Degaussing
- Degidio v. West Group
- Degradation
- Degrade
- Degree
- Degree of proof
- Degrees-minutes-seconds
- Degrees of freedom
- Deidentified
- Deidentified data
- Del.icio.us
- Delamination
- Delaware Criminal Justice Information System
- Delay
- Delayed send
- Delays in the Implementation of the Farmers Home Administration's Unified Management Information System
- Delegate
- Delegation of Procurement Authority
- Delegation of authority
- Delegation of duties clause
- Deleo & Internet Yellow Pages Network v. ZConnex
- Delete
- Deleted file
- Deleted file recovery
- Deleting
- Deletion
- Deliberate
- Deliberate compromise
- Deliberate exposure
- Delimiter
- Delink
- Delisting
- Deliverable
- Deliverable Expectation Document
- Deliverable management
- Deliverable software
- Delivering Electronic Information in a Knowledge-based Democracy
- Delivering on the Promise of Big Data and the Cloud
- Delivery
- Delivery Sequence File
- Delivery mechanism
- Delivery order
- Delivery policy
- Dell Computer Corp.
- Dell v. Dellkorea.com
- Delta
- Delta point
- Demagnetize
- Demand-assigned multiple access
- Demand-side platform
- Demand Response Automation Server
- Demand Response Availability Data System
- Demand Response Coordinating Committee
- Demand Response Research Center
- Demand Response and Smart Grid Coalition
- Demand letter
- Demand response
- Demand response ready
- Demilitarized zone
- Democracy
- Democracy Disrupted?
- Democracy Under Threat: Risks and Solutions in the Era of Disinformation and Data Monopoly
- Democratic Enterprise: Sustaining Media and Civil Society
- Democratization of knowledge
- Demodulation
- Demographics
- Demography
- Demon dialer
- Demon program
- Demurrer
- Demystifying Cyber Insurance
- Demystifying the Internet of Things
- Dendrite International v. Doe
- Denial
- Denial-of-reputation
- Denial-of-service attack
- Denial and deception
- Denial of service
- Denigration
- Denison v. Larkin
- Deny
- Deny by default
- Deoxyribonucleic acid
- Department's Management of Cloud Computing Services
- Department Releases Intake and Charging Policy for Computer Crime Matters
- Department Security Officer
- Department for Business, Innovation and Skills
- Department for Digital, Culture, Media & Sport
- Department for Innovation, Universities and Skills
- Department of Agriculture
- Department of Broadband, Communications and the Digital Economy
- Department of Commerce
- Department of Commerce: Relationship with the Internet Corporation for Assigned Names and Numbers
- Department of Commerce IT Privacy Policy
- Department of Communications, Information Technology and the Arts
- Department of Defense
- Department of Defense (DoD) Compliance with the Internationally Accepted Standard for Electronic Transmission and Storage of Fingerprint Data from "Red Force" Personnel
- Department of Defense (DoD)’s Defense Industrial Base (DIB) Cybersecurity (CS) Activities Final Rule
- Department of Defense Appropriations Act 1987
- Department of Defense Architecture Framework
- Department of Defense Biometric Standards Development Recommended Approach
- Department of Defense Chief Information Office
- Department of Defense Chief Information Officer
- Department of Defense Computer Emergency Response Team
- Department of Defense Cyberspace Policy Report
- Department of Defense Directive 7920.1
- Department of Defense Electronic Biometric Transmission Specification
- Department of Defense Enterprise Architecture
- Department of Defense Information Network
- Department of Defense Intelligence Components
- Department of Defense Intelligence Information System
- Department of Defense Intelligence Information System Enterprise
- Department of Defense Intelligence Production Program
- Department of Defense Metadata Registry
- Department of Defense Strategy for Operating in Cyberspace
- Department of Defense information network operations
- Department of Defense information networks
- Department of Defense intelligence production
- Department of Defense’s Defense Industrial Base Cyber Security/Information Assurance Program
- Department of Education
- Department of Electronic Communications of the Ministry of Communications and Works
- Department of Electronics and Information Technology
- Department of Energy
- Department of Energy Cyber Security Management
- Department of Energy High-End Computing Revitalization Act of 2004
- Department of Energy Infrastructure Security and Energy Restoration Network
- Department of Enterprise, Trade and Employment
- Department of Geographic Information
- Department of Health, Education, and Welfare
- Department of Health and Human Services
- Department of Homeland Security
- Department of Homeland Security's Federal Information Sharing Environment Privacy and Civil Liberties Protection Policy
- Department of Homeland Security/ALL-00I Freedom of Information Act and Privacy Act Records System of Records
- Department of Homeland Security: Assessments of Selected Complex Acquisitions
- Department of Homeland Security: Progress Made in Implementation and Transformation of Management Functions, but More Work Remains
- Department of Homeland Security Appropriations Act of 2007
- Department of Homeland Security Information Sharing Strategy
- Department of Homeland Security Plan for Organization and Management of National Security and Emergency Preparedness (NS/EP) Communications Functions
- Department of Homeland Security Strategic Plan: Fiscal Years 2012–2016
- Department of Housing and Urban Development
- Department of Industry, Innovation, Climate Change, Science, Research and Tertiary Education
- Department of Information Technology
- Department of Justice
- Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology
- Department of Labor
- Department of Mental Health v. Beil
- Department of Motor Vehicles
- Department of Technology Services
- Department of Trade and Industry
- Department of Veterans Affairs
- Department of Veterans Affairs Information Security Enhancement Act of 2006
- Department of the Army, Information Collection
- Department of the Army Cryptographic Access Program
- Department of the Army Intelligence Information Service
- Department of the Interior
- Department of the Navy
- Department of the Navy Application and Database Management System
- Department of the Navy Chief Information Officer
- Department of the Navy Policy for Content of Publicly Accessible World Wide Web Sites
- Department of the Treasury
- Departmental Committee on Computer Security
- Departmental intelligence
- Departments and agencies
- Dependability
- Dependability Development Support Initiative
- Dependency
- Dependent claim
- Dependent code
- Dependent tasks
- Deperimeterize
- Deploy Passive Sensors Across Federal Systems
- Deployable Air Land Exploration Robot
- Deployed Cellular Voice Exchange
- Deployment
- Deployment of Advanced Telecommunications Capability: Second Report
- Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion
- Deposit
- Deposit Requirements for Registration of Automated Databases that Predominantly Consist of Photographs
- Deposit account
- Deposit copy
- Deposit of Computer Programs and Other Works Containing Trade Secrets - Notice of Inquiry
- Depositary bank
- Deposition
- Depository
- Depository library
- Depreciable durable asset
- Depreciation
- Dept. of Education, Privacy Impact Assessments (PIA)
- Deputy Assistant Secretary of Defense for Cyber Policy
- Deputy Assistant Secretary of Defense for Developmental Test and Evaluation
- Deputy Chief of Naval Operations for Information Dominance
- Deputy Chief of Staff, G-2
- Deputy Chief of Staff for Intelligence
- Deputy Chief of Staff for Intelligence, Surveillance, and Reconnaissance
- Deputy Director Intelligence Integration
- Deputy PCII Officer
- Deregulation
- Derf
- Derivative
- Derivative classification
- Derivative classifier
- Derivative file
- Derivative work
- Derived data
- Derogation
- Derogatory information
- Descramble
- Descrambler
- Descriptive analysis
- Descriptive mark
- Descriptive metadata
- Design
- Design-Build-Finance-Operate
- Design Data v. Unigate Enterprise
- Design Furnishings v. Zen Path
- Design and implementation
- Design around
- Design flaw
- Design patent
- Design patent application
- Design phase
- Design review
- Design specification
- Design trade-off analysis
- Designated Approving Authority
- Designated Intelligence Disclosure Official
- Designated accrediting authority
- Designated community
- Designated disclosure authority
- Designated market area
- Designated registrar
- Designated security officer
- Designation and Sharing of Controlled Unclassified Information (CUI)
- Designation of agent
- Designed-in Cyber Security for Cyber-Physical Systems
- Designed-in security
- Designed to call attention
- Designee
- Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology
- Desired state specification
- Desknet Systems v. Desknet
- Desktop-as-a-Service
- Desktop application
- Desktop computer
- Desktop environment
- Desktop firewall
- Desktop productivity tools software
- Desktop publishing
- Desktop software
- Desktop videoconferencing
- Desourcing
- Destination IP address
- Destroy
- Destroyed state
- Destruction
- Destructive Malware (Joint Statement)
- Detailed design
- Detailed manufacturing or process data
- Detariffing
- Detect
- Detect and avoid
- Detecting Deception
Advertisement
34,539
pages
Local Sitemap
Advertisement