Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 11 - 20 of 2132467 documents for půjčky pro slováky Navštivte web na WWWLOAN24HXYZ rychlá pujcka online Vlašim mobilní pujčka na učet online pujcky Kunovice gilmorova děvčata tajnosti a půjčky online podnikatelská půjčka úrok pujcka do vyplaty slozenkou půjčka bez doložení příjmu a bez registru online nové pujcky pred výplatou Chlumec nad Cidlinou online pujcka pred výplatou Hrádek nad Nisou rychla pujcka online Bystřice pod Hostýnem zarucena pujcka o vikendu ihned pujčka 5000 do hodiny nebankovní pujcky online Šumperk
Relevance
Date
  1. Online Voter Registration Membership

    https://www.nist.gov/itl/voting/online-voter-registration-membership
    READ-ONLY SITE MATERIALS: Historical voting TWiki site (2015-2020) ARCHIVED
  2. Maintaining Your Online Privacy

    https://www.nist.gov/blogs/manufacturing-innovation-blog/maintaining-your-online-privacy
    It might not be the most important subject on your mind when running your business, but online privacy is becoming increasingly important as we move closer t
  3. Sexting

    https://bigdatawg.nist.gov/_uploadfiles/M0117_v1_7649817357.pdf
    Sexting Page 1 of 2 Supported by US DOJ-OVW Grant #2007-TA-AX-K012.Opinions and recommendations expressed are the authors’ and do not necessarily reflect the views of DOJ. © 2011 National Network to End Domestic Violence, Safety Net Project • www.nnedv.org/safetynet • Email: safetynet [at] nnedv.org • Phone: 202-543-5566 Sexting    What is Sexting?   Sexting is the act of sending or receiving sexually suggestive or explicit messages or images (video/photo) via:    Any electronic communication including text messages, email, instant messages, and online posts;   Devices such as mobile phones and computers, camera or wireless devices;    Online and Internet services including social networki...
  4. NIST/NSTIC-IDtrust 2012-Putting Privacy into Perspective Balancing Potential, Pitfalls, and the Public Trust

    https://csrc.nist.gov/CSRC/media/Events/2012-NIST-NSTIC-IDtrust-Workshop/documents/richer.pdf
                                  Putting Privacy into Perspective: Balancing Potential, Pitfalls, and the Public Trust All Rights Reserved © Alcatel­Lucent 2011 Derek Richer Alcatel­Lucent � What do people know, say, do and value                                                                                                                                           What We Set Out to Do Understand how identity is changing and identify potential opportunities and pitfalls � What is the construct of identity in a 2.0 world? All Rights Reserved © Alcatel­Lucent 2011 � What do people know, say, do and value about identity considerations?...
  5. Economic Cast Study: The Impact of NSTIC on the Internal Revenue Service

    https://www.nist.gov/system/files/documents/2017/05/09/report13-2.pdf
    Pla nn ing Re po rt 1 3-2 Th e I mp act of NS TIC on th e In ter na l R eve nu e S erv ice Pre pa red by : RT I In ter na tio na l for Na tio na l In sti tut e o f Sta nd ard s & Te chn olo gy Jul y 2 01 3 Eco no mi c C ase St ud y: iii Contents Chapter Page Acknowledgements ix List of Abbreviations xi Abstract xiii Executive Summary ES-1 ES.1 National Strategy for Trusted Identities in Cyberspace ........................................ES-1 ES.2 Case Study Comparison of Proprietary versus NSTIC-Aligned Authentication at the IRS ......................................................................................ES-3 ES.3 Economic Impact Estimates .................................................
  6. January 2013

    https://www.nist.gov/system/files/economic-case-study-impact-nstic-irs.pdf
    Pla nn ing Re po rt 1 3-2 Th e I mp act of NS TIC on th e In ter na l R eve nu e S erv ice Pre pa red by : RT I In ter na tio na l for Na tio na l In sti tut e o f Sta nd ard s & Te chn olo gy Jul y 2 01 3 Eco no mi c C ase St ud y: iii Contents Chapter Page Acknowledgements ix List of Abbreviations xi Abstract xiii Executive Summary ES-1 ES.1 National Strategy for Trusted Identities in Cyberspace ........................................ES-1 ES.2 Case Study Comparison of Proprietary versus NSTIC-Aligned Authentication at the IRS ......................................................................................ES-3 ES.3 Economic Impact Estimates .................................................
  7. Microsoft Word - NNEDV_OnlinePrivacyandSafetyTips_3-2010_OVWApproved.doc

    https://bigdatawg.nist.gov/_uploadfiles/M0114_v1_1482476414.pdf
    Online Privacy & Safety Tips  Online Privacy & Safety Tips Supported by US DOJ-OVW Grant #2007-TA-AX-K012.Opinions and recommendations expressed are the authors’ and do not necessarily reflect the views of DOJ. © 2010 National Network to End Domestic Violence, Safety Net Project www.nnedv.org/safetynet Email: safetynet [at] nnedv.org Phone: 202-543-5566   Browsing the web safely and privately is concern for many people. A good general rule is that nothing online is private.  Another general rule is that you can’t be completely anonymous online. However, you can take steps to prevent sensitive  and personal information from making its rounds on the Web.   Email  Have more than on...
  8. About the nccoe

    https://www.nccoe.nist.gov/sites/default/files/library/Retail%20COI%20Meeting%20June%202016.pdf
    National Cybersecurity Center of Excellence (NCCoE) Consumer/Retail Sector Webinar • Multifactor Authentication for e-Commerce • Securing Non-Credit Card, Sensitive Consumer Data Bill Newhouse & Sarah Weeks June 21, 2016 2NCCoE Consumer/Retail Sector Community of Interest Webinar – June 21, 2016 AGENDA 12:00 PM Introduction to NCCoE 5 min 12:05 PM 12:10 PM 12:15 PM Background of Retail projects Overview of MFA project Overview of Data project 5 min 5 min 5 min 12:20 PM 12:37 PM 12:54 PM Deep dive into MFA project architecture and technical implementation Deep dive into Data project architecture and technical implementation Closing remarks/Next steps 17 min 17 min 6 min 3Multifactor Authentication for e-Commerce - Mitigating r...
Showing results 11 - 20 of 2132467 documents for půjčky pro slováky Navštivte web na WWWLOAN24HXYZ rychlá pujcka online Vlašim mobilní pujčka na učet online pujcky Kunovice gilmorova děvčata tajnosti a půjčky online podnikatelská půjčka úrok pujcka do vyplaty slozenkou půjčka bez doložení příjmu a bez registru online nové pujcky pred výplatou Chlumec nad Cidlinou online pujcka pred výplatou Hrádek nad Nisou rychla pujcka online Bystřice pod Hostýnem zarucena pujcka o vikendu ihned pujčka 5000 do hodiny nebankovní pujcky online Šumperk