Configuration Management

Results: 2112



#Item
881Technical communication / Perforce / Configuration management / Revision control / Software configuration management / Boost / Trac / Software / Computer programming / Computing

The Business Case for Perforce SCM Software Configuration Management Delivers A Competitive Advantage Introduction

Add to Reading List

Source URL: www.perforce.com

Language: English - Date: 2013-01-15 06:54:29
882Security Technical Implementation Guide / Mobile device management / Common Criteria / Communications security / Protection Profile / National Information Assurance Partnership / Security / Computer security / Cyberwarfare / Configuration management

Microsoft Word - U_DoD_MDM_PP_Annex_V1R1_TBD1.docx

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-02-25 12:12:21
883Configuration management / Security Technical Implementation Guide / Information technology management / Security / Computer security / Computer network security

UNCLASSIFIED DoD Annex for Mobile Device Fundamentals (MDF) Protection Profile Version 1, Release 1

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-02-03 09:57:46
884Project management / Baseline / Configuration management / Software project management

2015 Golden LEAF Health Care Workforce Initiative Project Management Plan The proposed outcomes and activities in the project management plan reflect some of the measures against which progress and performance of the pr

Add to Reading List

Source URL: www.goldenleaf.org

Language: English - Date: 2014-12-09 14:29:24
885Software distribution / System administration / Client–server model / Distributed computing architecture / Mobile software development / Configuration management / Windows Installer / Opsi / Software / System software / Microsoft Windows

jHAVEN Installation Guide

Add to Reading List

Source URL: www.qtso.com

Language: English - Date: 2014-10-23 12:03:57
886Internet standards / Network performance / Internet privacy / Computer network security / Computer networking / Proxy server / Dynamic Host Configuration Protocol / DHCP snooping / IP address / Computing / Internet / Network architecture

INASP: Effective Network Management Workshops Unit 6: Solving Network Problems About these workshops Authors:

Add to Reading List

Source URL: inasp.info

Language: English - Date: 2014-12-03 16:07:38
887Computer network security / Baseline / Software project management / Computer security / Computing / International Multilateral Partnership Against Cyber Threats / Configuration management / Information technology management / Security

PDF Document

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2014-11-14 10:01:27
888Software project management / Writing / Design / Computer icon / Visual arts / Typography / Baseline / Configuration management

Association of Independent Kentucky Colleges and Universities Baseline Most Recent

Add to Reading List

Source URL: www.cpe.ky.gov

Language: English - Date: 2015-01-22 22:17:31
889Baseline / Configuration management / Software project management

Kentucky State University Baseline Most Recent

Add to Reading List

Source URL: www.cpe.ky.gov

Language: English - Date: 2015-01-22 19:49:14
890Baseline / Configuration management / Software project management

Northern Kentucky University Baseline Most Recent

Add to Reading List

Source URL: www.cpe.ky.gov

Language: English - Date: 2015-01-22 19:01:14
UPDATE