Computer standard

Results: 6155



#Item
331

Safe Cross-Language Inheritance Kathryn E. Gray Computer Laboratory, University of Cambridge, UK Abstract. Inheritance is a standard means for reuse and for interfacing

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-05-01 17:52:19
    332Computing / Software / Computer architecture / Software bugs / Computing platforms / Address space layout randomization / C standard library / PaX / Buffer overflow / Stack buffer overflow / Linux / Android

    Curriculum Vitae Name: Current: Studies: Address:

    Add to Reading List

    Source URL: hmarco.org

    Language: English - Date: 2016-04-07 10:01:31
    333Data / Computing / Information technology / Computer access control / ISO/IEC 11179 / Knowledge representation / Records management / Nok Nok Labs / Authentication / Authenticator / Data type / Code

    FIDO UAF Authenticator Metadata Statements v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-authnr-metadata-v1.0-ps20141208.html Pre

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-03-30 14:07:03
    334

    Introduction to Standard ML Robert Harper1 School of Computer Science Carnegie Mellon University Pittsburgh, PA

    Add to Reading List

    Source URL: www-plan.cs.colorado.edu

    Language: English - Date: 2008-04-13 08:47:13
      335Computer access control / Access control / Authenticator / Nok Nok Labs / Authentication / HTML element

      FIDO UAF Authenticator Commands v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-authnr-cmds-v1.0-pshtml Previous version:

      Add to Reading List

      Source URL: fidoalliance.org

      Language: English - Date: 2015-03-30 14:07:05
      336Computer file formats / Engineering / Broadcast Exchange Format / Standards / Enco / Playout / Technology / Fax / Southfield /  Michigan / Science and technology

      PRESS RELEASE ENCO Announces Support for BXF Standard Southfield, MI. March 3, 2012: ENCO Systems, Inc., world leader in audio playout and automation systems, announced today that their DAD (Digital Audio Delivery) syste

      Add to Reading List

      Source URL: www.enco.com

      Language: English - Date: 2015-04-22 12:01:06
      337Computing / Security / Cloud computing / E-commerce / Secure communication / Crime prevention / National security / Cloud infrastructure / Payment Card Industry Data Security Standard / Threat Stack / Computer security / Stack

      SO LU TIO N B RIEF SECURITY SOLUTIONS FOR PCI DSS AND PII The media and publishing industry’s increasing migration to and expansion in the cloud means you’re tasked with minimizing risk and ensuring compliance throu

      Add to Reading List

      Source URL: www.threatstack.com

      Language: English - Date: 2016-02-02 12:48:42
      338Parallel computing / Application programming interfaces / Concurrent computing / Message Passing Interface / Computer cluster / Thread

      The New & Emerging MPI Standard presented by Richard L. Graham- Chairman

      Add to Reading List

      Source URL: meetings.mpi-forum.org

      Language: English - Date: 2010-11-28 20:40:17
      339Image compression / Graphics file formats / Data compression / Video compression / Computer file formats / JPEG / Discrete cosine transform / Lossless compression / Lossy compression / Quantization / Intra-frame / Arithmetic coding

      The JPEG Still Picture Compression Standard Gregory K. Wallace Multimedia Engineering Digital Equipment Corporation Maynard, Massachusetts

      Add to Reading List

      Source URL: ijg.org

      Language: English - Date: 2015-09-07 09:04:57
      340Security / Computer security / Prevention / Computing / E-commerce / Cryptography / Computer network security / National security / Payment Card Industry Data Security Standard / Cloud computing security / Information security / Threat

      P CI D S S CO MP LIA N CE ACHIEVING PCI DSS COMPLIANCE WITH THREAT STACK The protection of your customers’ payment information is paramount to your business’ survival. In the cloud, the level of security required to

      Add to Reading List

      Source URL: www.threatstack.com

      Language: English - Date: 2016-03-16 06:02:32
      UPDATE