- Optical scan
- Optical scan voting system
- Optical scanner
- Optical signal
- Optical splitter
- Optical storage
- Optical switching
- Optical telegraph
- Optically
- Optimization
- Optimum Technologies v. Henkel Consumer Adhesives
- Option
- Option to purchase
- Optional requirements
- Optionally piloted aircraft
- Options for Promoting Privacy on the National Information Infrastructure
- Optoelectronic device
- Or transported
- Oracle America, Inc. v. Google
- Oracle Corp. v. Light Reading
- Oral agreement
- Oral communication
- Oral information
- Orange Book
- Orbit
- Orbital jamming
- Orchestration
- Order Instituting Rulemaking on the Commission's Own Motion to Establish Consumer Rights and Consumer Protection Rules Applicable to All Telecommunications Utilities
- Order confirmation
- Order of battle
- Order of magnitude
- Order to File Special Report
- Ordnance Survey
- Oregon Digital Library
- Organic results
- Organisation of the Islamic Conference-CERT
- Organised Crime Threat Assessment
- Organised Crime in the Digital Age
- Organization
- Organization chart
- Organization for Security and Co-operation in Europe
- Organization for the Advancement of Structured Information Standards
- Organization of American States
- Organizational Structure and Information Systems Used To Manage the Army's Depot-Level Maintenance Programs
- Organizational culture
- Organizational data breach
- Organizational independence:
- Organizational innovation
- Organizational operations
- Organizational risk
- Organizational security
- Organized Crime Control Act of 1970
- Organized Crime Council
- Organized Crime Drug Enforcement Task Forces
- Organized crime
- Organized cyber intruder
- Organizing for Computer Crime Investigation and Prosecution
- Origin authentication
- Original Classification Authority
- Original application
- Original classification
- Original development manufacturer
- Original electronic evidence
- Original evidence
- Original jurisdiction
- Originality
- Originating Depository Financial Institution
- Originating agency identifier
- Origination
- Originator
- Originator Controlled
- Orphan Works: Statement of Best Practices
- Orphan Works and Mass Digitization: A Report of the Register of Copyrights
- Orphan work
- Orphaned data
- Orthogonal frequency-division multiplexing
- Orthoimagery
- Orthoimagery data
- Orthophotograph
- Orwellian
- Osama Bin Laden–themed Phishing Attempts
- Oscillator
- Other emergency communications service
- Other emergency communications service provider
- Other wireline
- Ottawa Declaration on Authentication for Electronic Commerce
- OurArchives wiki
- Our Competitive Future: Building the Knowledge-Driven Economy
- Our Cultural Commonwealth
- Out-of-band
- Out-of-band authentication
- Out-of-band emission
- Out-of-pocket expenses
- Out-of-the-box solution
- Out of scope
- Outage
- Outage Management System
- Outage detection
- Outage information
- Outage management
- Outage mapping
- Outage restoration
- Outage time
- Outbound link
- Outbound sharing
- Outbound traffic
- Outbox
- OutbreakNet
- Outcome
- Outcome economy
- Outer Space Treaty
- Outer space
- Outing
- Outlier
- Outlier detection
- Output
- Output block
- Output controls
- Output data
- Output device
- Output validation
- Outreach Working Group
- Outside attack
- Outside threat
- Outsider
- Outsider threat
- Outsourced Cloud Computing
- Outsourced IT-based process
- Outsourcing
- Outsourcing Agreement (No. 1)
- Outsourcing Standard
- Outsourcing agreement
- Outsourcing of Information and Transaction Processing
- Outsourcing risk assessment
- Outsourcing vendor
- Outward-looking sensor
- Out–of–band
- Over-classification
- Over-the-air
- Over-the-top
- Overblock
- Overbreadth doctrine
- Overhead
- Overhead bit
- Overhead data
- Overlapping rights
- Overlay
- Overlay auction
- Overload
- Overload interference
- Override
- Overseas National Information Infrastructure Policies
- Overseas Security Advisory Council
- Oversight
- Oversight for Cybersecurity Activities
- Overt
- Overt act
- Overt channel
- Overt collection
- Overt digital attack
- Overt security testing
- Overt testing
- Overture
- Overview of 3D Printing & Intellectual Property Law
- Overview of NCTC's Data Access as Authorized by the 2012 Attorney General Guidelines
- Overview of the Baseline Safeguard Protections Under NCTC’s 2012 Attorney General Guidelines
- Overview of the Internet of Things
- Overview of the Privacy Act of 1974
- Overwrite
- Overwrite procedure
- Overwriting virus
- Over‐collection
- Owned
- Owner
- Ownership
- Oxford Internet Institute
- Oxford Text Archive
- Oyster Software v. Form Processing
- O’Connor v. Commonwealth of Virginia
- P/CR/CL
- P2P
- P2P lending
- PA
- PAA
- PAC
- PAC-MAN
- PACER
- PACS
- PADI
- PAL
- PAM 25-1-1
- PAM 25-1-2
- PAM 25-52
- PAM 25-91
- PAN
- PAYG
- PB
- PBAS
- PBX
- PC-DOS
- PCC
- PCEHR system
- PCI
- PCIA
- PCII Program Manager
- PCII Program Office
- PCMCIA
- PCMCIA card
- PCMIA
- PCR
- PCS
- PCT
- PC architecture
- PC card
- PDC
- PDD
Advertisement
34,539
pages
Local Sitemap
Advertisement