Computer standard

Results: 6155



#Item
431Computer security / Antivirus software / Malware / Payment Card Industry Data Security Standard / Computer virus / Spyware / Rootkit / Unified threat management / Espionage / Computer network security / Cyberwarfare

CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-05 12:00:46
432Cryptographic protocols / Data / Wireless networking / Computer network security / Advanced Encryption Standard / ZigBee / IPsec / Block cipher modes of operation / IEEE 802.15.4 / Cryptography / Computing / IEEE 802

Security Considerations for IEEENetworks Naveen Sastry David Wagner University of California, Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:45
433Input/output / Technology / Medical imaging / Digital imaging / DICOM / Telehealth / Liquid crystal display / RGB color model / Contrast ratio / Display technology / Television technology / Computer graphics

neX-Series | The Next Generation of Medical Display Solution Creating the Next Standard, Today WIDE’s new X-Series display solutions raise the standard of

Add to Reading List

Source URL: www.ims.es

Language: English - Date: 2012-11-19 04:29:09
434

Audio Interchange File Format: "AIFF" version 1.3 Audio Interchange File Format: "AIFF" A Standard for Sampled Sound Files Version 1.3 Apple Computer, Inc.

Add to Reading List

Source URL: zamzar.files.wordpress.com

Language: English - Date: 2014-10-13 10:14:58
    435Electronic commerce / Credit cards / Computer law / Computing / Business / SecurityMetrics / Payment Card Industry Data Security Standard / Penetration test / PA-DSS / Payment systems / Data privacy / Computer security

    SecurityMetrics External Vulnerability Scanning Criminals continually find new ways to exploit business networks and steal sensitive data. Find your business’ external network weaknesses and validate accurate security

    Add to Reading List

    Source URL: www.securitymetrics.com

    Language: English - Date: 2015-07-14 12:51:45
    436Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Stack / C standard library / Pointer / C / Subroutine / Computing / Software bugs / Software engineering

    The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2002-04-30 18:05:07
    437Computer performance / XLDB / Benchmarking / Benchmark / Standard Performance Evaluation Corporation / Big data / Apache Hadoop / Technology / Computing / Data management

    Introducing the SPEC RG Big Data Working Group May 19, 2015 XLDB 2015

    Add to Reading List

    Source URL: www-conf.slac.stanford.edu

    Language: English - Date: 2015-05-19 20:26:26
    438Memory management / Software bugs / Debugging / C Standard Library / C dynamic memory allocation / Region-based memory management / Memory leak / Garbage collection / Memory debugger / Computing / Computer programming / Software engineering

    Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum {jchow,blp,talg,mendel}@cs.stanford.edu Stanford University Department of Computer Science

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2005-07-06 14:16:50
    439Electronic commerce / Computer network security / Cyberwarfare / Payment Card Industry Data Security Standard / Security awareness / SecurityMetrics / Penetration test / Health Insurance Portability and Accountability Act / Threat / Computer security / Security / Data privacy

    SecurityMetrics Data Security Awareness Training Your business is only as secure as its weakest link. Get comprehensive Data Security Awareness Training for your employees to avoid a possible breach. Data Security Aware

    Add to Reading List

    Source URL: www.securitymetrics.com

    Language: English - Date: 2015-07-14 12:51:45
    440Electronics / Flash memory / Computer data storage / Personal computer hardware / Booting / Backup / Firmware / Computer / Non-volatile memory / Computer memory / Computer hardware / Computing

    GLI-11 V1.3 RuleOther Standards. This standard covers the actual requirements for single player gaming devices in casinos. The following other standards may apply:

    Add to Reading List

    Source URL: www.gaminglabs.com

    Language: English - Date: 2014-08-13 12:07:53
    UPDATE