Computer standard

Results: 6155



#Item
601Internet / Denial-of-service attacks / Computer network security / Robots exclusion standard / Denial-of-service attack / Video game bot / Web crawler / CAPTCHA / Internet privacy / Computing / World Wide Web / Software

[Bot Attacks] – [December 17, Topic: Bot Attacks

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2014-01-29 19:32:16
602Software / SPECpower / Standard Performance Evaluation Corporation / SPECvirt / Server Efficiency Rating Tool / Benchmark / VMmark / Transaction Processing Performance Council / Computer performance / Evaluation / Computing / System software

Microsoft PowerPoint - icpe2015-osg-power-poster.pptx

Add to Reading List

Source URL: icpe2015.ipd.kit.edu

Language: English - Date: 2015-03-03 04:31:44
603Credit cards / Computing / Computer law / Business / Money / Payment Card Industry Data Security Standard / PA-DSS / Qualified Security Assessor / Payment card industry / Payment systems / Data privacy / Electronic commerce

PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1 For merchants and other entities involved in payment card processing

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-05-22 12:43:30
604Information technology management / Risk analysis / Cyberwarfare / Security awareness / Information security management system / IT risk / Network security / Vulnerability / Information security / Computer security / Data security / Security

State of New Mexico Statewide Architectural Configuration Requirement Title: Security Training and Awareness Standard S-POLEffective Date: August 18, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:32
605Computing / Technology / IEEE 802.11 / Cyberwarfare / Wireless security / Wireless LAN / Wireless access point / Wi-Fi / IEEE 802.1X / Computer network security / Wireless networking / Cryptographic protocols

State of New Mexico Statewide Architectural Configuration Requirement Title: Wireless Access Point Hardware Standard NDT-STD008.001 Effective Date: October 18, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:45
606Medicine / Nursing informatics / Medical classification / Technical communication / Health Level 7 / LOINC / Interoperability / Specification / Computer standard / Standards / Health / Medical informatics

EHR Association Comments on Standards Advisory General Impressions The EHR Association (EHRA) and its members welcome ONC’s creation of the draft interoperability Standards Advisory. In general, we agree with most of t

Add to Reading List

Source URL: www.himssehra.org

Language: English - Date: 2015-05-08 11:42:30
607Electronic commerce / Computer network security / National security / Corporate security / Computer security / Cloud computing / Payment Card Industry Data Security Standard / Chief information officer / Information security / Security / Crime prevention / Public safety

ONE DAY AT A TIME CIO perspectives on security issues FINDINGS FROM ONE-ON-ONE INTERVIEWS

Add to Reading List

Source URL: www.itworldcanada.com

Language: English - Date: 2015-04-23 14:48:28
608RAID / Pure Storage / Standard RAID levels / Oracle Database / Database / Backup / Computer hardware / Computing / Software

Pure Storage for Oracle On Pure Storage it’s simple. Designed from the ground up to remove the layers of storage complexity for Oracle databases. Simple by Design Any file system/block size/

Add to Reading List

Source URL: www.purestorage.com

Language: English - Date: 2015-04-14 10:42:51
609C programming language / Procedural programming languages / C / PL/I / Bc programming language / SQL / MAD / Computing / Software engineering / Computer programming

Rationale for International Standard— Programming Languages— C Revision 5.10

Add to Reading List

Source URL: www.math.utah.edu

Language: English - Date: 2004-02-20 04:13:00
610Estimation theory / Normal distribution / Variance / Maximum likelihood / Standard deviation / Steganography / Statistical hypothesis testing / Statistics / Statistical inference / Data analysis

Maximum likelihood estimation of length of secret message embedded using ±K steganography in spatial domain Jessica Fridricha , David Soukalb , Miroslav Goljana a Department of Electrical and Computer Engineering;

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-04-26 14:41:51
UPDATE