Computer industry

Results: 4151



#Item
431Waste reduction / Computer recycling / Waste legislation / Recycling industry / Electronic waste / Product stewardship / Extended producer responsibility / Waste Management /  Inc / Recycling / Waste management / Sustainability / Industrial ecology

National Television and Computer Product Stewardship Scheme ISSUE 2: JULY 2010

Add to Reading List

Source URL: laptop.deh.gov.au

Language: English - Date: 2010-07-08 19:37:29
432Computer network security / Software testing / Rapid7 / Metasploit Project / Penetration test / Payment Card Industry Data Security Standard / Exploit / Attack / Vulnerability / Computer security / Software / Cyberwarfare

White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing?

Add to Reading List

Source URL: www.aquion.com.au

Language: English
433Technology / Computer programming / Computer program / Computer / Free software / Personal computer / Debugging / Electronics / Software industry / Computing / Application software / Software

What is software? A basic definition of software How is software created? Software is a set of instructions that makes

Add to Reading List

Source URL: www.siprofessionals.org

Language: English - Date: 2009-08-29 21:14:28
434Office equipment / Paper recycling / Paper shredder / Security / Computer recycling / Nutrient cycle / Public key certificate / Louisville /  Kentucky / Purge / Sustainability / Recycling / Destruction

Exclusive Offer: Oldham County Chamber & School Board Greenway Shredding & Recycling is led by the most experienced industry professional in Kentucky & Southern Indiana providing document destruction services since 1997.

Add to Reading List

Source URL: oldhamcountychamber.com

Language: English - Date: 2014-05-21 14:10:56
435Business / Security / Computer security / Credit cards / Data privacy / Payment Card Industry Data Security Standard / Firewall / Password / Acquiring bank / Electronic commerce / Payment systems / Computer network security

Visa Security Alert: Remote Access Vulnerabilities—Most Frequent Attack Method Used by Intruders

Add to Reading List

Source URL: en.chasepaymentech.ca

Language: English - Date: 2015-05-28 10:11:58
436International Telecommunication Union / United States Department of Homeland Security / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / Information Technology Industry Council / Computer security / National Cybersecurity Center / National security / Cyberspace / Cyberwarfare / Security / Computer crimes

Federal Register / Vol. 80, NoThursday, March 19, Notices The meeting will be held on Monday, April 13, 2015, from 1:30 p.m.

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2015-03-19 12:08:23
437Office equipment / Computer printers / Graphic design / Print production / Printer / Digital printing / Inkjet printer / Océ / Prepress / Printing / Technology / Media technology

Join the printing industry as a Make a great impression!

Add to Reading List

Source URL: www.futureprint.org.au

Language: English - Date: 2014-01-15 18:44:29
438Wireless / Telecommunications engineering / Payment systems / Cryptographic protocols / Wireless security / Payment Card Industry Data Security Standard / Wireless access point / Wireless LAN / Wi-Fi / Wireless networking / Technology / Computer network security

VISA DATA SECURITY BULLETIN 9 September 2010 Wireless Networks Requires Data Security Controls Merchants that have implemented or are considering using wireless technology must develop and deploy

Add to Reading List

Source URL: en.chasepaymentech.ca

Language: English - Date: 2015-05-28 10:12:02
439Credit cards / Computer law / Business / Computer security / Computing / Payment Card Industry Data Security Standard / Qualified Security Assessor / Payment card industry / SecurityMetrics / Data privacy / Payment systems / Electronic commerce

PCI-DSS Best Practices: Maximizing Level IV Merchant Engagement Executive Summary Payment Card Industry data security standards (PCI-DSS) is not a new topic in the industry; however, recent

Add to Reading List

Source URL: www.electran.org

Language: English - Date: 2013-01-18 15:01:41
440Cybernetics / Numerical analysis / Evolutionary algorithms / Mathematical optimization / Applied mathematics / MilkyWay@home / Swarm intelligence / Validation / Verification and validation / Science / Pharmaceutical industry / Validity

Validating Evolutionary Algorithms on Volunteer Computing Grids Travis Desell1 , Malik Magdon-Ismail1 , Boleslaw Szymanski1 , Carlos A. Varela1 , Heidi Newberg2 , and David P. Anderson3 1 Department of Computer Science

Add to Reading List

Source URL: wcl.cs.rpi.edu

Language: English - Date: 2015-01-22 12:32:36
UPDATE