[permalink] [id link]
:: See secure computing for a discussion of computer security using this approach.
from
Wikipedia
Some Related Sentences
:: and See
:: Christ is raised with his own body: " See my hands and my feet, that it is I myself "; but he did not return to an earthly life.
:: Example: The determination of “ new value ” is “ a mixed question of law and fact .” See In re Spada, 903 F. 2d 971, 975 ( 3d Cir. 1990 ).
:: Example: See also Eolas Technologies Inc. v. Microsoft Corp., 399 F. 3d 1325, 1339 ( C. A. Fed. 2005 ) (“ oftware code ... drives the functional nucleus of the finished computer product .” ( quoting Imagexpo, L. L. C.
:: Example: The Court indirectly recognized as much when it stated in McMann v. Richardson, supra, 397 U. S., at 770, 771, 90 S. Ct., at 1448, 1449, that a guilty plea cannot be attacked as based on inadequate legal advice unless counsel was not “ a reasonably competent attorney ” and the advice was not “ within the range of competence demanded of attorneys in criminal cases .” See also Cuyler v. Sullivan, supra, 446 U. S., at 344, 100 S. Ct., at 1716.
:: Example: " See People v. Hilt, 298 Ill. App. 3d 121, 123, 125-26, 698 N. E. 2d 233, 232 Ill. Dec.
:: See generally John copeland Nagle & J. B. Ruhl, The Law of Biodiversity and Ecosystem Management 227-45 ( 2002 ) ( detailing the ESA's prohibition on the possession of protected species ).
:: See generally Akhil Reed Amar, Reports of My Death Are Greatly Exaggerated: A Reply, 138 U. Pa. L. Rev.
:: See Committee Note to Interim Rule 8001 ( f ) (" Given the short time limit to file the petition with the circuit clerk, subdivision ( f )( 1 ) provides that entry of a certification on the docket does not occur until an effective appeal is taken under Rule 8003 ( a ) or ( b ).
:: and secure
:: ( ii ) Termination of all claims or states of belligerency and respect for and acknowledgment of the sovereignty, territorial integrity and political independence of every State in the area and their right to live in peace within secure and recognized boundaries free from threats or acts of force.
:: Example: In the aftermath of the Civil War, there was an outpouring of discussion of the Second Amendment in Congress and in public discourse, as people debated whether ** 2810 and how to secure constitutional rights for newly free slaves.
:: RSAES-PKCS1 v1. 5 ( Permitted ' for the time being ' ( as empirically secure ), due to use in SSL3. 0 / TSL1. 0 -- use only with maximum caution )
In 2008, Heffer called for the United Nations to be strengthened :: " If the UN ceases to be regarded by the larger powers as a institution to secure the peace of the world and justice therein, then that holds out all sorts of potential dangers.
:: Having reached a secure place on elevated ground at a distance of about half a league ( 2 kilometers ) from the town, we halted in a hut to rest a little and take some food.
:: c. It is a violation of the Geneva Convention to place a prisoner under physical or mental duress, torture or any other form of coercion in an effort to secure information.
:: and computing
:: The World Wide Web can be thought of as a database, albeit one spread across millions of independent computing systems.
:: Example: If the CSPRNG under consideration produces output by computing bits of π in sequence, starting from some unknown point in the binary expansion, it may well satisfy the next-bit test and thus be statistically random, as π appears to be a random sequence.
:: Research areas: Models of Computation and Complexity ( automata and formal language theory and applications, Natural computing, bioinformatics, riceInformatics, formal models for e-voting ), Algorithmics, Designs and Implementations ( visualization and implementations, algorithmics for hard problems, algorithmic game theory, scheduling problem ), Combinatorial Networks, Information Technology in Education.
2.167 seconds.