- Stateful evaluation
- Stateful inspection
- Stateful packet inspection
- Stateless
- Stateless Attribution: Toward International Accountability in Cyberspace
- Statement
- Statement of Licensing Principles
- Statement of Policy on the Management of Internet Names and Addresses
- Statement of Use
- Statement of objectives
- Statement of the United States and the European Union on Building Consumer Confidence in E-Commerce and the Role of Alternative Dispute Resolution
- Statement of work
- Statement on Artificial Intelligence, Robotics and 'Autonomous' Systems
- Statement on Auditing Standards 70 audit process
- Statement on Cryptocurrencies and Initial Coin Offerings by SEC
- Statement on Potentially Unlawful Promotion of Initial Coin Offerings and Other Investments by Celebrities and Others
- Statement on the Fair Use of Images for Teaching, Research, and Study
- Statement testing
- States of Sustainability: A Review of State Projects funded by the National Digital Information Infrastructure and Preservation Program (NDIIPP)
- Statewide Communication Interoperability Plans
- Statewide Cybersecurity Task Forces
- Statewide Information Management Manual
- Statewide default answering point
- Static
- Static IP address
- Static analysis
- Static analysis detection tool
- Static authentication
- Static block
- Static content
- Static exfiltration
- Static key
- Static page
- Station authentication
- Statistical
- Statistical Community of Practice and Engagement
- Statistical Transparency Report Regarding Use of National Security Authorities: Annual Statistics for Calendar Year 2013
- Statistical activities
- Statistical analysis
- Statistical data
- Statistical purpose
- Statistical record
- Statistical sampling
- Statistical system
- Statistically valid
- Statistics
- Status Report on Near-Term Local Bypass Developments
- Status Report on the Administration’s Commitment to Open Government
- Status message
- Status of Biennial Reporting Requirements under the Privacy Act and the Computer Matching and Privacy Protection Act
- Status quo
- Statute
- Statute Law Database
- Statute of Anne
- Statute of Monopolies
- Statute of frauds
- Statute of limitations
- Statutory bar
- Statutory damages
- Statutory disclaimer
- Statutory interpretation
- Statutory license
- Statutory license of musical compositions
- Statutory license of sound recordings
- Statutory license of television programming
- Statutory royalty
- Stay
- Stay Smart Online
- Stay of proceedings
- Staying Safe on Social Network Sites
- Steady-state
- Steady state investment
- Stealth mode
- Stealth virus
- Stealthing
- Stebbins v. Wal-Mart
- Steel collar
- Steer-by-wire
- Steering
- Steering Committee for Data Security in State Administration
- Steganalysis
- Steganography
- Stenzel v. Pifer
- Step-Saver Data Systems v. Wyse
- Step-and-repeat camera
- Step-down transformer
- Step-in rights
- Steps to Improve Cyber Security of SCADA Networks
- Stereo photographic coverage
- Stereophonic sound
- Sterile area
- Stern Electronics v. Kaufman
- Stern v. Delphi
- Steve Jackson Games v. U.S. Secret Service
- Stevenson-Wydler Technology Innovation Act of 1980
- Stewardship
- Stewart v. Abend
- Stickiness
- Sticky content
- Still-image camera
- Still Image Working Group
- Still image
- Still photography
- Stilwell Center for Advanced Studies in Science and Technology Policy
- Stimulus
- Stipulation
- Stock-keeping unit
- Stock footage
- Stocktake of Progress Toward the Key Elements of a Fully Liberalised Telecommunications Sector in the APEC Region
- Stone Ghost
- Stoned
- Stoner v. eBay
- Stop.Think.Connect. Campaign
- StopBullying.gov
- Stop Trading on Congressional Knowledge Act of 2012
- Stop bit
- Stop the Presses? Newspapers in the Digital Age
- Stop words
- Stopping Malware and Unauthorized Software Through Application Whitelisting
- Stopping Spam: Creating a Stronger, Safer Internet
- Storage
- Storage Area Network
- Storage Networking Industry Association
- Storage Technology v. Custom Hardware
- Storage allocation
- Storage allocation algorithm
- Storage appliance
- Storage capacity
- Storage key
- Storage management
- Storage medium
- Storage migration
- Storage object
- Storage system
- Storage virtualization
- Storch v. Ipco Safety Products
- Store
- Store and forward
- Store card
- Store loyalty card
- Stored-value card
- Stored Program Control Point
- Stored Value Cards and Other Nontraditional Access Mechanisms
- Stored program controlled
- Stored wire communication
- Storyboard
- Stoutenborough v. National Football League
- Stove-piped
- Stovepipe application
- Stovepipe system
- Stovepipe warning
- Strain sensor
- Strand v. Librascope
- Strange Music v. Strange Music
- Strategic
- Strategic Advisory Board for IP Policy
- Strategic Alliance Cyber Crime Working Group
- Strategic Automated Command and Control System
- Strategic Communication Policy Coordinating Committee
- Strategic Communication and Information Operations in the DoD
- Strategic Computing Program
- Strategic Cyber Industry Group
- Strategic Cyberspace Operations Guide
- Strategic Defense Initiative
- Strategic Defense Initiative Organization
- Strategic Framework for the Information Economy 2004-2006: Opportunities and Challenges for the Information Age
- Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network Society
- Strategic Health IT Advanced Research Projects
- Strategic Homeland Infrastructure Risk Assessment
- Strategic Information Warfare: A New Face of War
- Strategic Information and Operations Center
- Strategic Intent for Information Sharing
- Strategic National Implementation Process
- Strategic National Risk Assessment
- Strategic Perspective Series
- Strategic Principles for Securing the Internet of Things (IoT)
- Strategic Studies Institute
- Strategic advantage
- Strategic alliance
- Strategic analysis
- Strategic and Competitive Intelligence Professionals
- Strategic assessment
- Strategic assets
- Strategic challenges
- Strategic communication
- Strategic imagery
- Strategic information management
- Strategic information warfare
- Strategic intelligence
- Strategic market research
- Strategic military deception
- Strategic objective
- Strategic partnership
- Strategic plan
- Strategic planning
- Strategic risk
- Strategic sourcing
- Strategic warning
- Strategies for Improving the U.S. Payment System
- Strategies for Procurement Innovation and Reform: Final Report
- Strategies to Mitigate Targeted Cyber Intrusions
- Strategy
- Strategy and Planning Committee
- Strategy and Policy Unit
- Strategy for E-democracy
- Strategy for Securing Control Systems
- Strategy for Targeting Organized Piracy
- Strategy to Combat Transnational Organized Crime: Addressing Converging Threats to National Security
- Strategy to Ensure a Trusted, Secure and Sustainable Online Environment
- Stration
- Stratton Faxon v. National Mutual
- Stratton Oakmont v. Prodigy
- Straughn v. Thompson
- Strauss v. Microsoft
- Stream cipher
- Stream data
- Stream ripping
- Streaming
- Streaming media
- Streaming media player
- Streaming stick
- Streamlined Sales Tax Implementing States
- Streamlined Sales and Use Tax Agreement
- Streamlined Sales and Use Tax Project
- Streamlining Authentication and Identity Management within the Federal Government
- Street View
- Streisand effect
- Strength
- Strength of function
- Strengthening Public Health Infrastructure for Improved Health Outcomes
- Strengthening our Nation's Cyber Defenses
- Strengthening the National Security of Australia's Critical Infrastructure
- Strengthening the Resilience of Outsourced Technology Services
- Stress testing
- Strick Corp. v. Strickland
- Strict liability
- Strict scrutiny
- Striking similarity
- String
- Strom Thurmond National Defense Authorization Act for Fiscal Year 1999
- StrongKey
- Strong Artificial Intelligence and National Security
- Strong Security Requirements for Internet Engineering Task Force Standard Protocols
- Strong authentication
- Strong mark
- Strong password
- Strong user authentication
- Structural Dynamics Research v. Engineering Mechanics Research
- Structural metadata
- Structural mitigation
- Structural separation
- Structure information
- Structured Query Language
- Structured Threat Information Expression
- Structured data
- Structured data entry
- Structured information
- Structured message text
- Structured programming
- Structured walk-through test
- Studio
- Study Group Concerning Electronic Payment, and Electronic Money
- Study Group Report on Cloud Computing
- Study Group for the Advancement of the Condition for the Use of Telecommunications
- Study Group for the Legal System on Electronic Commerce
- Study Group on Electronic Certification over Networks
- Study of Financial Advantages of Purchasing over Leasing of Electronic Data Processing Equipment in the Federal Government
- Study of Security Attributes of Smart Grid Systems – Current Cyber Security Issues
- Study of the Acquisition of Peripheral Equipment for Use with Automatic Data Processing Systems
- Study on Data Collection and Storage in the EU
- Study on Specialized Intellectual Property Courts
- Study on the Economic Impact of the Electronic Commerce Directive, Final Report
- Study on the Financial Aspects of Network Security: Malware and Spam
- Study on the Human Rights Implications of the Usage of Drones and Unmanned Robots in Warfare
- Study on the Liability of Internet Intermediaries, Final Report
- Study phase
- Study to Identify Measures Necessary for a Successful Transition to a More Electronic Federal Depository Library Program
- StumbleUpon
Advertisement
34,539
pages
Local Sitemap
Advertisement