- Department of Defense Strategy for Operating in Cyberspace
- Department of Defense information network operations
- Department of Defense information networks
- Department of Defense intelligence production
- Department of Defense’s Defense Industrial Base Cyber Security/Information Assurance Program
- Department of Education
- Department of Electronic Communications of the Ministry of Communications and Works
- Department of Electronics and Information Technology
- Department of Energy
- Department of Energy Cyber Security Management
- Department of Energy High-End Computing Revitalization Act of 2004
- Department of Energy Infrastructure Security and Energy Restoration Network
- Department of Enterprise, Trade and Employment
- Department of Geographic Information
- Department of Health, Education, and Welfare
- Department of Health and Human Services
- Department of Homeland Security
- Department of Homeland Security's Federal Information Sharing Environment Privacy and Civil Liberties Protection Policy
- Department of Homeland Security/ALL-00I Freedom of Information Act and Privacy Act Records System of Records
- Department of Homeland Security: Assessments of Selected Complex Acquisitions
- Department of Homeland Security: Progress Made in Implementation and Transformation of Management Functions, but More Work Remains
- Department of Homeland Security Appropriations Act of 2007
- Department of Homeland Security Information Sharing Strategy
- Department of Homeland Security Plan for Organization and Management of National Security and Emergency Preparedness (NS/EP) Communications Functions
- Department of Homeland Security Strategic Plan: Fiscal Years 2012–2016
- Department of Housing and Urban Development
- Department of Industry, Innovation, Climate Change, Science, Research and Tertiary Education
- Department of Information Technology
- Department of Justice
- Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology
- Department of Labor
- Department of Mental Health v. Beil
- Department of Motor Vehicles
- Department of Technology Services
- Department of Trade and Industry
- Department of Veterans Affairs
- Department of Veterans Affairs Information Security Enhancement Act of 2006
- Department of the Army, Information Collection
- Department of the Army Cryptographic Access Program
- Department of the Army Intelligence Information Service
- Department of the Interior
- Department of the Navy
- Department of the Navy Application and Database Management System
- Department of the Navy Chief Information Officer
- Department of the Navy Policy for Content of Publicly Accessible World Wide Web Sites
- Department of the Treasury
- Departmental Committee on Computer Security
- Departmental intelligence
- Departments and agencies
- Dependability
- Dependability Development Support Initiative
- Dependency
- Dependent claim
- Dependent code
- Dependent tasks
- Deperimeterize
- Deploy Passive Sensors Across Federal Systems
- Deployable Air Land Exploration Robot
- Deployed Cellular Voice Exchange
- Deployment
- Deployment of Advanced Telecommunications Capability: Second Report
- Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion
- Deposit
- Deposit Requirements for Registration of Automated Databases that Predominantly Consist of Photographs
- Deposit account
- Deposit copy
- Deposit of Computer Programs and Other Works Containing Trade Secrets - Notice of Inquiry
- Depositary bank
- Deposition
- Depository
- Depository library
- Depreciable durable asset
- Depreciation
- Dept. of Education, Privacy Impact Assessments (PIA)
- Deputy Assistant Secretary of Defense for Cyber Policy
- Deputy Assistant Secretary of Defense for Developmental Test and Evaluation
- Deputy Chief of Naval Operations for Information Dominance
- Deputy Chief of Staff, G-2
- Deputy Chief of Staff for Intelligence
- Deputy Chief of Staff for Intelligence, Surveillance, and Reconnaissance
- Deputy Director Intelligence Integration
- Deputy PCII Officer
- Deregulation
- Derf
- Derivative
- Derivative classification
- Derivative classifier
- Derivative file
- Derivative work
- Derived data
- Derogation
- Derogatory information
- Descramble
- Descrambler
- Descriptive analysis
- Descriptive mark
- Descriptive metadata
- Design
- Design-Build-Finance-Operate
- Design Data v. Unigate Enterprise
- Design Furnishings v. Zen Path
- Design and implementation
- Design around
- Design flaw
- Design patent
- Design patent application
- Design phase
- Design review
- Design specification
- Design trade-off analysis
- Designated Approving Authority
- Designated Intelligence Disclosure Official
- Designated accrediting authority
- Designated community
- Designated disclosure authority
- Designated market area
- Designated registrar
- Designated security officer
- Designation and Sharing of Controlled Unclassified Information (CUI)
- Designation of agent
- Designed-in Cyber Security for Cyber-Physical Systems
- Designed-in security
- Designed to call attention
- Designee
- Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology
- Desired state specification
- Desknet Systems v. Desknet
- Desktop-as-a-Service
- Desktop application
- Desktop computer
- Desktop environment
- Desktop firewall
- Desktop productivity tools software
- Desktop publishing
- Desktop software
- Desktop videoconferencing
- Desourcing
- Destination IP address
- Destroy
- Destroyed state
- Destruction
- Destructive Malware (Joint Statement)
- Detailed design
- Detailed manufacturing or process data
- Detariffing
- Detect
- Detect and avoid
- Detecting Deception
- Detection
- Detection Error Trade-off Curve
- Detection and identification rate
- Detection by interception
- Detection of modification
- Detection risk
- Detection tool
- Detector
- Deter
- Deterioration
- Determinants of Digital Technology Use by Companies
- Deterministic modification
- Deterministic random bit generator
- Deterrence
- Deterrence by denial
- Deterrence by punishment
- Deterrent
- Detroit Tigers v. Ignite Sports Media
- Deus ex machina
- Deutsche Bank Securities v. Montana Bd. of Investments
- Deutsche Gesellschaft für Recht und Informatik
- Deutscher Commercial Internet Exchange
- DevOps
- Developed
- Developer
- Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices
- Developing a Framework To Improve Critical Infrastructure Cybersecurity
- Development
- Development, Implementation, and Operation of the Defense Integrated Data System
- Development, modernization, and enhancement
- Development-and-Test-as-a-Service
- Development and Use of Computerized Criminal History Information
- Development of Espionage, Counterintelligence, and Counterterrorism Awareness
- Development of High-speed Networks and the Role of Municipal Networks
- Development of a National Digital Geospatial Data Framework
- Development phase
- Developmental testing
- Developments In International Mobile Roaming
- Developments in Internet Filtering Technologies and Other Measures for Promoting Online Safety
- Deviation
- Device
- Device-agnostic
- Device-to-device
- Device and media controls
- Device attack
- Device authentication
- Device cybersecurity capabilities
- Device endpoint
- Device fingerprint
- Device generated data
- Device identifier
- Device role
- Dewey decimal classification system
- Dexter
- De‐anonymization
- DgMarket
- DiMeo v. Max
- Diacritical mark
- Diagnostic data management
- Diagnostic device
- Diagnostic software
- Diagnostics
- Diagram
- Dial-a-porn
- Dial-up client
- Dial-up connection
- Dial-up connectivity
- Dial Information Services v. Thornburgh
- Dial phone
- Dial tone
- Dialer
- Dialer program
- Dialing and signaling information
- Dialing software
- Dialog box
- Dialup users list
- Diamond v. Chakrabarty
- Diamond v. Diehr
- Diarama Trading Co. v. J. Walker Thompson
- Dibit
- Dicta
- Dictionary attack
- Did a Thermostat Break the Internet?
- Difference Engine
- Difference score
- Different Categories of Computer Crimes
- Differential Global Positioning System
- Differential Pulse Code Modulation
- Differential global navigation satellite system
- Differential privacy
- Diffie-Hellman
- Diffusing the Fog: Cloud Computing and Implications for Public Policy
- Dig once policy
- Digerati
- Digest
- Digg
- DigiCULT
- Digicash
- Digit
- Digital
- Digital, Culture, Media and Sport Committee
- Digital-Imaging and Optical Digital Data Disk Storage Systems: Long-Term Access Strategies for Federal Agencies
- Digital-native newspaper
- Digital-to-analog conversion
- DigitalEurope
- Digital 21 Strategy
- Digital Access Index
- Digital Access and Cross-Connect System
- Digital Accountability and Transparency Act
- Digital Addressable Lighting Interface
- Digital Advanced Mobile Phone Service
- Digital Advertising Alliance
- Digital Agenda 2015
- Digital Agenda for Europe
- Digital Agenda for Norway
Advertisement
34,539
pages
Local Sitemap
Advertisement