Computer networks
Resource Information
The topic Computer networks represents a specific aggregation or gathering of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer networks
Resource Information
The topic Computer networks represents a specific aggregation or gathering of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer networks
685 Items that are about the Topic Computer networks
Context
Context of Computer networksFocus of
No resources found
No enriched resources found
- Computer networks -- Security measures | Auditing
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy
- Computer networks -- Security measures | Government policy -- United States
- Computer networks -- Security measures | International cooperation
- Computer networks -- Security measures | International cooperation -- Congresses
- Computer networks -- Security measures | Law and legislation -- United States
- Computer networks -- Security measures | Research -- United States
- Computer networks -- Security measures | Research -- United States -- Finance
- Computer networks -- Security measures | Social aspects
- Computer networks -- Security measures | Standards
- Computer networks -- Security measures | Technological innovations -- United States
- Computer networks -- Social aspects
- Computer networks -- Social aspects
- Computer networks -- Social aspects
- Computer networks -- Social aspects -- Congresses
- Computer networks -- Social aspects -- United States
- Computer networks -- Standards
- Computer networks -- Standards
- Computer networks -- Standards -- United States -- Evaluation
- Computer networks -- United States
- Computer networks -- United States -- Congresses
- Computer networks -- United States -- Evaluation
- Computer networks -- United States -- Management
- Computer networks -- United States -- Moral and ethical aspects
- Computer networks -- West (U.S.)
- Computer networks
- Computer networks
- Computer networks
- Computer networks -- Access control
- Computer networks -- Access control
- Computer networks -- Access control
- Computer networks -- Access control -- United States
- Computer networks -- Access control -- United States
- Computer networks -- China
- Computer networks -- Congresses
- Computer networks -- Developing countries
- Computer networks -- Dictionaries
- Computer networks -- Economic aspects
- Computer networks -- Energy conservation -- United States
- Computer networks -- Europe -- Safety measures
- Computer networks -- Finance | Evaluation
- Computer networks -- Government policy
- Computer networks -- Government policy -- Congresses
- Computer networks -- Government policy -- United States
- Computer networks -- International cooperation
- Computer networks -- Law and legislation
- Computer networks -- Law and legislation
- Computer networks -- Law and legislation
- Computer networks -- Law and legislation -- Africa, East
- Computer networks -- Law and legislation -- Asia
- Computer networks -- Law and legislation -- China | Hong Kong
- Computer networks -- Law and legislation -- Congresses
- Computer networks -- Law and legislation -- Developing countries
- Computer networks -- Law and legislation -- Europe
- Computer networks -- Law and legislation -- Europe -- Congresses
- Computer networks -- Law and legislation -- European Union countries
- Computer networks -- Law and legislation -- Germany
- Computer networks -- Law and legislation -- Germany
- Computer networks -- Law and legislation -- Germany -- Criminal provisions
- Computer networks -- Law and legislation -- Great Britain
- Computer networks -- Law and legislation -- Ireland
- Computer networks -- Law and legislation -- Pennsylvania
- Computer networks -- Law and legislation -- Periodicals
- Computer networks -- Law and legislation -- Scandinavia
- Computer networks -- Law and legislation -- Switzerland -- Criminal provisions
- Computer networks -- Law and legislation -- Tanzania
- Computer networks -- Law and legislation -- United States
- Computer networks -- Law and legislation -- United States
- Computer networks -- Law and legislation -- United States -- Cases
- Computer networks -- Law and legislation -- United States -- Criminal provisions
- Computer networks -- Law and legislation -- United States -- Periodicals
- Computer networks -- Law and legislation | Criminal provisions
- Computer networks -- Management
- Computer networks -- Management | Examinations -- Study guides
- Computer networks -- Management | Examinations -- Study guides
- Computer networks -- Reliability
- Computer networks -- Remote access | Security measures -- United States
- Computer networks -- Research -- United States
- Computer networks -- Research -- United States -- Finance
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Europe -- Congresses
- Computer networks -- Security measures -- Germany
- Computer networks -- Security measures -- Handbooks, manuals, etc
- Computer networks -- Security measures -- Korea (South)
- Computer networks -- Security measures -- Periodicals
- Computer networks -- Security measures -- Poland
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States
- Computer networks -- Security measures -- United States -- Congresses
- Computer networks -- Security measures -- United States -- Evaluation
- Computer networks -- Security measures -- United States -- Finance
- Computer networks -- Security measures -- United States -- Planning
- Computer networks -- Security measures -- United States -- States
Subfocus of
No resources found
No enriched resources found
- Administrative agencies -- Computer networks -- United States -- Evaluation
- Administrative agencies -- Computer networks | Access control -- United States
- Administrative agencies -- Computer networks | Access control -- United States -- Evaluation
- Administrative agencies -- Computer networks | Access control | Security measures
- Administrative agencies -- Computer networks | Security Measures -- United States
- Administrative agencies -- Computer networks | Security measures -- United States
- Administrative agencies -- Computer networks | Security measures -- United States -- Evaluation
- Administrative agencies -- Computer networks | Security measures | Research -- United States
- Aeronautics, Commercial -- Computer networks | Security measures
- Aeronautics, Commercial -- Computer networks | Security measures -- European Union countries
- Air traffic control -- Computer networks | Security measures -- United States
- Airline passenger security screening -- Computer networks -- United States
- Airline passenger security screening -- Computer networks -- United States -- Evaluation
- Border security -- Computer networks -- United States -- Costs
- Border security -- Computer networks -- United States -- Evaluation
- Business enterprises -- Computer networks
- Business enterprises -- Computer networks
- Business enterprises -- Computer networks -- United States
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures
- Business enterprises -- Computer networks | Security measures -- Congresses
- Business enterprises -- Computer networks | Security measures -- Germany
- Business enterprises -- Computer networks | Security measures -- United States
- Capital market -- Computer networks -- United States
- Clearinghouses (Banking) -- Computer networks -- United States
- Corporations -- Computer networks | Management
- Credit bureaus -- Computer networks | Security measures -- United States
- Data encryption (Computer science) -- Computer networks -- United States
- Elections -- Computer networks | Security measures -- United States
- Electronic voting -- Computer networks | Security measures -- United States
- Equifax, Inc. -- Computer networks | Security measures
- Executive departments -- Computer networks | Access control -- United States
- Executive departments -- Computer networks | Security measures -- United States
- Experian (Firm) -- Computer networks | Security measures
- Federal Deposit Insurance Corporation -- Computer networks | Access control
- Federal Deposit Insurance Corporation -- Computer networks | Security measures
- Federal government -- Computer networks | Protection
- Financial institutions -- Computer networks | Security measures -- United States
- Financial institutions -- Computer networks | Security measures | Government policy -- United States
- Financial services industry -- Computer networks | Security measures -- United States
- Government information -- Computer networks | Security measures -- United States
- Health services administration -- Computer networks
- Indians of North America -- Computer networks
- Infrastructure (Economics) -- Computer networks | Security measures -- United States
- Intelligence service -- Computer networks -- United States
- Juvenile courts -- Washington (D.C.) -- Computer networks | Finance
- Law offices -- Computer networks | Security measures -- United States
- Legislative bodies -- Computer networks
- Local government -- Computer networks | Security measures -- United States
- National security -- Computer networks -- United States
- National security -- Computer networks -- United States -- Evaluation
- Political participation -- Computer networks
- Private companies -- Computer networks | Protection
- Public health -- Computer networks | Government policy -- United States
- Representative government and representation -- Computer networks
- Resource programs (Education) -- Computer networks | Cost control
- Retail trade -- Computer networks -- Congresses
- Securities industry -- Computer networks | Security measures -- United States
- Security, International -- Computer networks
- Small business -- Computer networks | Security measures
- Small business -- Computer networks | Security measures -- United States
- Small business -- Computer networks | Security measures -- United States -- Costs
- Stock exchanges -- Computer networks -- United States
- Student aid -- Computer networks | Security measures -- United States
- Trans Union (U.S.) -- Computer networks | Security measures
- Tribal government -- Computer networks | Security measures -- United States
- U.S. Customs and Border Protection -- Computer networks | Access control | Evaluation
- Uber (Firm) -- Computer networks | Security measures
- United States -- National Guard | Computer networks
- United States, Coast Guard -- Computer networks | Security measures
- United States, Department of Defense -- Computer networks | Security measures
- United States, Department of Education | Federal Student Aid -- Computer networks | Security measures
- United States, Department of Homeland Security -- Computer networks
- United States, Department of Homeland Security -- Computer networks | Evaluation
- United States, Department of Homeland Security -- Computer networks | Security measures
- United States, Department of Veterans Affairs -- Computer networks | Security measures
- United States, Federal Aviation Administration -- Computer networks | Security measures
- United States, Internal Revenue Service -- Computer networks | Security measures
- United States, Office of Personnel Management -- Computer networks | Security measures
- United States, Securities and Exchange Commission -- Computer networks | Security measures
- United States, Small Business Administration -- Computer networks | Security measures
- Universities and colleges -- Computer networks
- Universities and colleges -- Computer networks | Corrupt practices -- United States -- Prevention
- Universities and colleges -- Computer networks | Security measures
- Voting -- Computer networks | Security measures -- Illinois
- Voting -- Computer networks | Security measures -- United States
- Voting-machines -- Computer networks | Security measures -- United States
- Yahoo! Inc. -- Computer networks | Security measures
- Administrative agencies -- Computer networks -- United States -- Planning
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/XZo6WnbQGrw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/XZo6WnbQGrw/">Computer networks</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Topic Computer networks
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/XZo6WnbQGrw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Topic"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/XZo6WnbQGrw/">Computer networks</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>