You limited your search to:

 Collection: Congressional Research Service Reports
Technology Transfer: Use of Federally Funded Research and Development

Technology Transfer: Use of Federally Funded Research and Development

Date: September 10, 2002
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Technology Transfer: Use of Federally Funded Research and Development

Technology Transfer: Use of Federally Funded Research and Development

Date: July 12, 2002
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Technology Transfer: Use of Federally Funded Research and Development

Technology Transfer: Use of Federally Funded Research and Development

Date: May 28, 2002
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Technology Transfer: Use of Federally Funded Research and Development

Technology Transfer: Use of Federally Funded Research and Development

Date: April 8, 2002
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Technology Transfer: Use of Federally Funded Research and Development

Technology Transfer: Use of Federally Funded Research and Development

Date: December 3, 2001
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Technology Transfer: Use of Federally Funded Research and Development

Technology Transfer: Use of Federally Funded Research and Development

Date: December 5, 2000
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Date: October 20, 2005
Creator: Rollins, John & Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Terrorist Use of the Internet: Information Operations in Cyberspace

Terrorist Use of the Internet: Information Operations in Cyberspace

Date: March 8, 2011
Creator: Theohary, Catherine A.
Description: This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas.
Contributing Partner: UNT Libraries Government Documents Department
Third Generation ("3G") Mobile Wireless Technologies and Services

Third Generation ("3G") Mobile Wireless Technologies and Services

Date: January 17, 2001
Creator: Nunno, Richard M
Description: None
Contributing Partner: UNT Libraries Government Documents Department