- AETHER
- AF
- AFC
- AFCEA International
- AFIPS
- AFIS
- AFK
- AFP
- AFRICOM
- AGI
- AGIC
- AGNOSC
- AGing Integrated Database
- AHIC
- AHS
- AI
- AI, Robots, and Swarms, Issues, Questions, and Recommended Studies
- AIA
- AIC
- AID
- AIF
- AIFF
- AIFS
- AIM
- AIMP
- AIMS
- AIN
- AIO/CIO Reporting
- AIP
- AIPA
- AIRS
- AIS
- AISB
- AIT
- AI Council
- AI Group of Experts (OECD)
- AI Now Institute
- AI Risk Management Framework
- AI Sector Deal
- AI actor
- AI and Control of Covid-19 Coronavirus
- AI assistant
- AI in the UK: ready, willing and able?
- AI knowledge
- AI practitioner
- AI system
- AI system lifecycle
- AI technologies
- AI winter
- AJAX
- ALC
- ALERT
- ALGOL
- ALI
- ALIA
- ALMAWEB
- ALOHAnet
- ALPR
- ALliance for the Information Society
- AM
- AM/FM streaming
- AM/FM webcaster
- AMA
- AMBER alert
- AMC-R 10-101
- AMC-R 381-1
- AMC Suppl 1 to AR 381-1
- AMDS
- AMIA
- AMIPCI
- AMIS
- AMI Enterprise Task Force
- AMI Security Task Force
- AMI communications network
- AMI head end
- AML/CFT
- AMP
- AMPAS v. NSI
- AMPS
- AMS
- AM broadcast
- AM broadcaster
- AM broadcasting
- AND
- AND logic
- ANI
- ANI system
- ANS
- ANSI/ISA-62443-2-1 (99.02.01)-2009
- ANSI/ISA-62443-3-3 (99.03.03)-2013
- ANSI/NBS-ICST 1-1986
- ANSI/NIST-ITL
- ANSI ASC X12
- ANSI Homeland Defense and Security Standardization Collaborative
- ANSI X9.31-1998
- ANSI X9.62-2005
- ANSI X9.84-2010
- ANSI standards
- AO
- AOL v. AOL.org
- AOL v. AT&T
- AOL v. IMS
- AOL v. LCGM
- AOL v. Pasieka
- AOL v. Prime Data Systems
- AOL v. St. Paul Mercury Insurance
- AP
- APA
- APAC
- APB
- APC
- APCO International
- APC Internet Rights Charter
- APEC-OECD Malware Workshop
- APEC-OECD Workshop on Security of Information Systems and Networks: Summary
- APEC Blueprint for Action on Electronic Commerce
- APEC Cooperative Response Guidelines in Cross-Border Environment
- APEC Cybersecurity Strategy
- APEC Electronic Commerce Business Alliance
- APEC Guidelines for Creating Voluntary Cyber Security ISP Codes of Practice
- APEC Guidelines for Secure International E-Commerce Transactions
- APEC Leaders' Declaration
- APEC Privacy Framework
- APEC Symposium on Information Privacy Protection in E-Government and E-Commerce
- API 1164 Pipeline SCADA Security, Version 2
- APL
- APNIC
- APP
- APSTARS
- APT
- APT1
- APTS
- APTS technologies
- APWG Crypto Currency Working Group
- AP v. All Headline News
- ARC
- ARDA
- ARENTO
- ARGUS
- ARIA
- ARIEL
- ARIN
- ARL
- ARM
- ARMA International
- ARP
- ARPANET
- ARP spoofing
- ARSC Guide to Audio Preservation
- ARTFL Project
- AR 190-15
- AR 190-27
- AR 190-53
- AR 25-1
- AR 25-11
- AR 25-13
- AR 25-2
- AR 25-400-2
- AR 25-55
- AR 27-60
- AR 380-13
- AR 380-5
- AR 380-58
- AR 381-10
- AR 381-19
- AR 381-20
- AR 530-1
- AR 70-11
- AR 70-57
- AS
- ASA
- ASAP
- ASC
- ASCII
- ASCII character set
- ASDI
- ASEAN Regional Forum Statement on Cooperation in Fighting Cyber Attack and Terrorist Misuse of Cyberspace
- ASIASAT
- ASIC
- ASIC miner
- ASIP
- ASIS
- ASIS International
- ASO Address Council
- ASP
- ASPP
- ASPR
- ASR
- ASSIST
- ASTM E1869-04(2014)
- ASTM International
- ASTM International Committee F38
- AT
- AT&T
- AT&T Consent Decree
- AT&T v. ATT&T
- ATA
- ATC
- ATI
- ATIS
- ATM
- ATM Industry Association
- ATM card
- ATM cell
- ATM fraud
- ATM switch
- ATO
- ATP
- ATP 2-22.9
- ATS
- ATS-Inbound
- ATS-International
- ATS-Land
- ATS-Outbound
- ATS-Passenger
- ATS-Trend Analysis and Analytical Selectivity Program
- ATSC 3.0
- ATU
- AV
- AVI
- AVL
- AVS
- AVnu Alliance
- AWIC
- AWNIS
- AWS
- AYAME
- AZ-CERT
- AZW
- A "Kill Chain" Analysis of the 2013 Target Data Breach
- A Bank Customer’s Guide to Cybersecurity
- A Best Practices Guide to Information Security
- A Bibliography of Documents Issued by the GAO on Matters Related to ADP
- A Bibliography of Documents Issued by the GAO on Matters Related to ADP, IRM & Telecommunications
- A Bill of Privacy Rights for Social Network Users
- A Blueprint for Digital Identity: The Role of Financial Institutions in Building Digital Identity
- A Borderless World: Realising the Potential of Global Electronic Commerce
- A CFTC Primer on Virtual Currencies
- A Call for Action for Online Piracy and Counterfeiting Legislation
- A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections
- A Coherent Framework for Building Trust in the Digital Single Market for E-commerce and Online Services
- A Comparison of Cross-Sector Cyber Security Standards
- A Comprehensive Review of Optical Character Readers Used in Mail Processing
- A Consumer's Guide to E-Payments
- A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records
- A Cyberattack on the U.S. Power Grid
- A Cyberworm that Knows No Boundaries
- A DARPA Perspective on Artificial Intelligence
- A Data Foundation for the National Spatial Data Infrastructure
- A Declaration of the Independence of Cyberspace
- A Definition of AI: Main Capabilities and Disciplines
- A Digital Agenda for Europe: EC Communication
- A Digital Single Market Strategy for Europe
- A European Initiative in Electronic Commerce
- A European Strategy for Data
- A Framework for Global Electronic Commerce
- A Framework for a National Broadband Policy
- A Framework of Safety for the Internet of Things
- A Global Action Plan for Electronic Commerce
- A Global Alliance for ICT: Bringing Policy Making to the Public and the Public to Policy Making
- A Global Reality: Governmental Access to Data in the Cloud
- A Glossary of Terms Used in the Federal Budget Process
- A Good Decade for Cybercrime
- A Guide for Acquiring Commercial Software
- A Guide for Acquiring Software Development Services
- A Guide for Acquiring Systems Integration Services
- A Guide to Implementing Cloud Services: Better Practice Guide
- A Guide to Planning, Acquiring, and Managing Information Technology Systems
- A Guide to Understanding Audit in Trusted Systems
- A Guide to Understanding Data Remanence in Automated Information Systems
- A Guide to Understanding Discretionary Access Control in Trusted Systems
- A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems
- A Guide to Your Rights
- A Guideline on Office Automation Security
- A Human Capital Crisis in Cybersecurity
- A Human Right
- A Legal Analysis of the Statutory and Contractual Allocation of Data Rights in Federal Contracts Subject to 10 U.S.C. 2320
- A Legal and Empirical Study into the Intellectual Property Implications of 3D Printing
- A Legal and Empirical Study of 3D Printing Online Platforms and an Analysis of User Behaviour
- A Look at the Legal Environment for Driverless Vehicles
- A Manifesto for Online Communities
- A Matter of Size: Triennial Review of the National Nanotechnology Initiative
- A Model Technological and Social Architecture for the Preservation of State Government Digital Information
- A Nation Online: Entering the Broadband Age
- A Nation of Opportunity: Realizing the Promise of the Information Superhighway
- A National Plan for Migrating to IP-Enabled 9-1-1 Systems
- A National Policy Framework for Structural Adjustment Within the New Commonwealth of Information
- A National Security Strategy for a New Century
- A New Evolution in Hack Attacks: A General Overview of Types, Methods, Tools, and Prevention
- A New Generation of American Innovation
- A Pan-Canadian Strategy for Identity Management and Authentication
- A Patent System for the 21st Century
- A Plan for a U.S. National Land Imaging Program
- A Policy Framework for Consumer Protection in Electronic Commerce
- A Policy Framework for the 21st Century Grid: A Progress Report
- A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future
- A Policymaking Guide on Additive Manufacturing: A Guide for Policymakers
- A Practical Guide for the Understanding, Acquiring, Using, Transferring, and Disposition of Intellectual Property by DoD Personnel
- A Practical Guide to Federal Enterprise Architecture
- A Preliminary Assessment of the National Crime Information Center and the Computerized Criminal History System
- A Primer on Metadata: Separating Fact from Fiction
- A Proposal for an International Convention on Cyber Crime and Terrorism
- A Proposal to Improve the Technical Management of Internet Names and Addresses
- A Question of Balance: Private Rights and the Public Interest in Scientific and Technical Databases
- A Question of Trust: Report of the Investigatory Powers Review
- A Report Concerning Passenger Name Record Information Derived from Flights between the U.S. and the European Union
- A Report of the Commission on Federal Paperwork. Final Summary Report
- A Report on Discussions by the Working Group of the Subcommittee on Multi-Media Copyright Council: Study of Institutional Issues Regarding Multi-Media
- A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats
- A Review of the Federal Bureau of Investigation’s Use of National Security Letters
- A Review of the Next Generation Air Transportation System: Implications and Importance of System Architecture
- A Review of the U.S. Navy Cyber Defense Capabilities
- A Review of the U.S. Navy Cyber Defense Capabilities: Abbreviated Version of a Classified Report
- A Road Map Toward Resilience Against Botnets
- A Roadmap for Cybersecurity Research
- A Roadmap for US Robotics From Internet to Robotics
- A Section White Paper: A Call for Action for Online Piracy and Counterfeiting Legislation
- A Sober Look at National Security Access to Data in the Cloud
- A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation
- A State Cyber Hub Operations Framework
- A Strategic Framework for the Information Economy
- A Strategic Framework for the National Spatial Data Infrastructure
- A Strategy for American Innovation: Driving Towards Sustainable Growth and Quality Jobs
- A Strategy for American Innovation: Securing Our Economic Growth and Prosperity
- A Strategy for American Leadership in Advanced Manufacturing
- A Strategy for E-procurement
- A Strategy for ICT R&D and Innovation in Europe: Raising the Game
- A Strategy for a Secure Information Society - "Dialogue, Partnership and Empowerment"
- A Strategy for a Secure Information Society – “Dialogue, partnership and empowerment”
- A Strategy for the Digital Content Industry in Ireland
- A Strong Britain in an Age of Uncertainty: The National Security Strategy
- A Thin Line
- A Typology of Online Child Pornography Offending
- A Vision of Change for America and Technology for America’s Economic Growth, A New Direction to Build Economic Strength
- A Working Glossary of Computer Software Terms
- A la carte
- A la carte service
- A priori
- A private area of the individual
- A record
- Ab initio
- Abacus
- Abandoned call
- Abandoned invention
- Abandoned record
34,538
pages