Computer standard

Results: 6155



#Item
701Data types / Procedural programming languages / Primitive types / Array programming languages / Fortran / Cross-platform software / C / Pointer / Array data type / Computing / Software engineering / Computer programming

ISO/IEC JTC1/SC22/WG5 N1824 Coarrays in the next Fortran Standard John Reid, JKR Associates, UK April 21, 2010 Abstract

Add to Reading List

Source URL: www.fortranplus.co.uk

Language: English - Date: 2015-05-29 16:20:11
702Scientific method / Data analysis / Princeton Engineering Anomalies Research Lab / Protocol / Standard deviation / Computer / Statistical hypothesis testing / Cosmic microwave background radiation / Standard score / Statistics / Science / Design of experiments

Journal of Scientific Exploration, Vol. 14, No. 4, pp. 499–555, 00 © 2000 Society for Scientific Exploratio n Mind/Machine Interaction Consortium:

Add to Reading List

Source URL: www.princeton.edu

Language: English - Date: 2010-11-03 02:50:49
703High-definition television / IEEE 802.11n-2009 / Orthogonal frequency-division multiplexing / HDMI / Phase-shift keying / PHY / IEEE 802.15.4 / Certified Wireless USB / Electronic engineering / Computer hardware / OSI protocols

   tc48Rev1-2.doc    :52 AM For Ecma use only Ecma TC48 draft standard for high rate 60 GHz WPANs Whitepaper

Add to Reading List

Source URL: ecma-international.org

Language: English - Date: 2014-10-28 05:21:49
704Business / Security / Computer security / Credit cards / Data privacy / Payment Card Industry Data Security Standard / Firewall / Password / Acquiring bank / Electronic commerce / Payment systems / Computer network security

Visa Security Alert: Remote Access Vulnerabilities—Most Frequent Attack Method Used by Intruders

Add to Reading List

Source URL: en.chasepaymentech.ca

Language: English - Date: 2015-05-28 10:11:58
705Thread / Java Platform /  Standard Edition / Java / Lock / Aeolus / Fork / Parallel computing / Exception handling / Computing / Concurrency control / Concurrent computing

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 14, 2012

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-09-18 11:16:47
706Wireless / Telecommunications engineering / Payment systems / Cryptographic protocols / Wireless security / Payment Card Industry Data Security Standard / Wireless access point / Wireless LAN / Wi-Fi / Wireless networking / Technology / Computer network security

VISA DATA SECURITY BULLETIN 9 September 2010 Wireless Networks Requires Data Security Controls Merchants that have implemented or are considering using wireless technology must develop and deploy

Add to Reading List

Source URL: en.chasepaymentech.ca

Language: English - Date: 2015-05-28 10:12:02
707Credit cards / Computer law / Business / Computer security / Computing / Payment Card Industry Data Security Standard / Qualified Security Assessor / Payment card industry / SecurityMetrics / Data privacy / Payment systems / Electronic commerce

PCI-DSS Best Practices: Maximizing Level IV Merchant Engagement Executive Summary Payment Card Industry data security standards (PCI-DSS) is not a new topic in the industry; however, recent

Add to Reading List

Source URL: www.electran.org

Language: English - Date: 2013-01-18 15:01:41
708Web standards / Identity management / Identity management systems / Web services / Federated identity / WS-SecurityPolicy / WS-Trust / WS-Security / WS-MetadataExchange / Computing / Computer security / Security

Web Services Federation Language (WS-Federation) Version 1.2 OASIS Standard

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2009-05-28 10:36:52
709Internet privacy / Software / Content management systems / Information / Spreadsheet / Intranet / Content inventory / Microsoft Excel / Content management / Data management / Computing / Computer networks

KM APRIL 2013 Beyond the standard content audit

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-09 02:58:58
710Software engineering / C Standard Library / C dynamic memory allocation / Memory management / Heap spraying / Address space layout randomization / Heap feng shui / Alexander Sotirov / Buffer overflow protection / Computing / Computer programming / Software bugs

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
UPDATE