Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
2007
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
dbkwik.webdatacommons.org
associated with source
dataset(s)
Attributes
Values
rdfs:label
2007
is
dcterms:subject
of
Estonia cyberattack
The Phishing Guide: Understanding & Preventing Phishing Attacks
Greenberg v. National Geographic Society
Federal Agency Data Mining Reporting Act of 2007
S&L Vitamins v. Australian Gold
Digital Media Law Project
Internet Governance Forum (IGF): The First Two Years
Office of Management and Budget "Breach Notification Policy"
GAO Reports - 2007
Interpretative Guidelines on Electronic Commerce and Information Property Trading
Hamzik v. Zale
Switzerland's e-Government Strategy
SEC, Privacy Impact Assessment Guide
Availability and Robustness of Electronic Communications Infrastructures
Federal Smart Grid Task Force
Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DOD Software
Recommendation for Key Management
Reminder - Ensuring Competition When Acquiring Information Technology and Using Common Security Configurations
J&B Wholesale Distributing v. Redux Beverages
Upstate New York Regional Intelligence Center
DA Memo 25-51
Improving Consumer Mortgage Disclosures: An Empirical Assessment of Current and Prototype Disclosure Forms
Congress and the Internet: Highlights
Chronopolis
Netalert
Perfect 10 v. CCBill
Brilliance Audio, Inc. v. Haights Cross Communication, L.L.C.
Energy Independence and Security Act of 2007
To Support the Information Commons: Principles for an Effective Information Commons
Tavory v. NTP
Business Software Association of Australia
AALL, National Security Letters
A Pan-Canadian Strategy for Identity Management and Authentication
OMB Memorandum M-07-24
Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues
NIST Special Publication 800-95
The U.S. Army Concept Capability Plan for Electromagnetic Spectrum Operations for the Future Modular Force 2015-2024
DoD CIO Net Centric Data Strategy
Coalition Against Domain Name Abuse
Cyber Security Combined Glossary Project
CCTV: Developing Privacy Best Practices
Recommendation on Consumer Dispute Resolution and Redress
National Continuity Policy Implementation Plan
NASA Privacy Procedural Requirements
DHS, Privacy Impact Assessments Official Guidance
Douglas v. U.S. Dist. Court
Privacy Policy Regarding Collection, Use, Retention and Dissemination of Information on Non-U.S. Persons
Freecycle Network v. Oey
Mullally v. Jones
National Identity Security Strategy
Mobile Commerce
State v. Consumer Digital Services
Internet Archive v. Shell
Next Generation Telecoms Networks
Global Intellectual Property Center
NIST Special Publication 500-271
Identity Theft: Innovative Solutions for an Evolving Problem
National Intelligence Coordination Center
POST Internet Governance
Review of Safeguarding Policies and Procedures for Personnel-Related Data
Federal Agencies Digitization Guidelines Initiative
Study on the Economic Impact of the Electronic Commerce Directive, Final Report
Nike v. Nikepal
Perfect 10 v. Amazon
DON Open Source Software Guidance
Glut: Mastering Information Through The Ages
Wideband Global SATCOM
Geospatial Intelligence Support to Joint Operations
Commonwealth Scientific and Industrial Research Organisation v. Buffalo Technology
DHS Privacy Technology Implementation Guide
OMB Memorandum M-08-05
In re Zango
Homeland Security Presidential Directive 20
OMB Memorandum M-07-06
Privacy Technology Implementation Guide
Universal Communication v. Lycos
2007 Annual Report to Congress on Foreign Economic Collection and Industrial Espionage
Reputation-based Systems: A Security Analysis
OMB Memorandum M-07-11
Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats
Homeland Security Presidential Directive 21
Security Issues and Recommendations for Online Social Networks
Enhanced Protections for Uses of Health Data: A Stewardship Framework for ‘Secondary Uses’ of Electronically Collected and Transmitted Health Data
The Transformation of Value Chains in the Canadian Arts and Cultural Industries
National Military Strategy for Cyberspace Operations Implementation Plan
IPhone
Investigations Involving the Internet and Computer Networks
Optimum Technologies v. Henkel Consumer Adhesives
Data Security Breaches: Context and Incident Summaries
Cybersecurity Guide for Developing Countries
International Actions against Cybercrime: Networking Legal Systems in the Networked Crime Scene
AR 25-400-2
Privacy: Lessons Learned about Data Breach Notification
Legal Issues Related to Prescription Drug Sales on the Internet
Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse
Final Report: Task Force to Study Electronic Health Records
NSTAC Report to the President on International Communications
National Strategy for Homeland Security
Red Flags Rule
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 3
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software