Critical Software

Results: 1293



#Item
971Skynet / Remote backup service / Backup / Software / Computing / Military technology / Backup software / Military satellites / British space programme

Attix5’s express delivery of critical backup service to SkyNet Case Study[removed]ATT_016_CASE STUDY COVERS.indd 3

Add to Reading List

Source URL: www.stage2data.com

Language: English - Date: 2014-07-08 11:54:17
972Software / Cisco Systems / Deep packet inspection / Videotelephony / Virtual LAN / Multiven / NetApp / Cisco Career Certifications / Cisco Eos / Computing / VMware / Technology

At-A-Glance Cisco Data Center Solution Support Service for Critical Infrastructure Multivendor Solution Support Accelerates Resolution of Data Center Issues

Add to Reading List

Source URL: www.cisco.com

Language: English
973Actuarial science / Hacking / Software testing / Vulnerability / Social vulnerability / Risk assessment / IT risk management / Critical infrastructure protection / Risk / Ethics / Management

ART_VR_approach20120123.ppt

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2012-05-17 18:31:12
974Safety / Reliability engineering / Software quality / Risk analysis / Office of Commercial Space Transportation / System safety / Hazard analysis / Life-critical system / Fault tree analysis / Systems engineering / Safety engineering / Systems science

FAA Commercial Space Transportation Guide to Reusable Launch and Reentry

Add to Reading List

Source URL: www.faa.gov

Language: English - Date: 2006-09-27 16:15:11
975Pharmaceuticals policy / Hazard analysis and critical control points / GNU Multiple Precision Arithmetic Library / Software / Health / Food safety / Pharmaceutical industry / Good manufacturing practice

Joe McCommons Senior Supply Chain Auditor The Steritech Group, Inc. Requirements for Good Manufacturing Practices

Add to Reading List

Source URL: www.extension.org

Language: English - Date: 2011-04-05 19:13:27
976Hazard analysis and critical control points / Process management / Fish processing / Computing / Software engineering / C / Systems engineering / Food safety / Food and Drug Administration / Hazard analysis

NSSP Standardized Shellfish Processing Plant Inspection Form Agency Name: Date Type of Inspection Certification Pre-operational Routine Follow-up Standardization

Add to Reading List

Source URL: issc.org

Language: English - Date: 2009-06-11 09:11:56
977Software testing / Computer network security / Hacking / Electronic commerce / Secure communication / Cross-site scripting / Vulnerability / Application security / Form / Cyberwarfare / Computer security / Computing

South Dakota Application Security Vulnerabilities The purpose of this document is to list existing and emerging threats that pose significant risk to State hosted applications and the critical information that is generat

Add to Reading List

Source URL: cybersecurity.sd.gov

Language: English - Date: 2014-07-01 15:38:36
978Crime prevention / Software testing / Cyberwarfare / Public safety / Vulnerability / Information security / Security testing / Critical infrastructure protection / Security / National security / Computer security

Office of the Minister of State Services Chair Cabinet Economic Growth and Infrastructure Committee UPDATE ON IMPLEMENTATION ACTIONS ARISING FROM THE GOVERNMENT CHIEF INFORMATION OFFICER’S REVIEW OF PUBLICLY ACCESSIBLE

Add to Reading List

Source URL: www.ssc.govt.nz

Language: English - Date: 2013-06-04 19:28:42
979Critical pedagogy / Educational psychology / Alternative education / Technological Pedagogical Content Knowledge / Educational software / Education / Teacher education / Educational technology

The SAIDE Teacher Education Modules This set of modules provides an issue-based, interactive library of high quality texts. Collectively the modules have cohesion in terms of curriculum and pedagogy. The table belo

Add to Reading List

Source URL: www.oerafrica.org

Language: English - Date: 2014-06-18 06:29:21
980Sandbox / Software testing / Malware / Password / Syllabus / System software / Software / Forensic Toolkit

Sandboxing for Incident Response Intermediate • Two-Day Instructor-Led Course You’ve responded to the incident on your network. You have collected all of the critical volatile data and performed analysis. During your

Add to Reading List

Source URL: ad-pdf.s3.amazonaws.com

Language: English - Date: 2014-07-11 17:58:47
UPDATE