Data Control

Results: 12347



#Item
981Computing / Identity management / Internet privacy / Privacy / Computer access control / End user / Information privacy / Personal /  Inc. / HTTP cookie / Password / Database / Internet forum

  PRIVACY POLICY AND PROTECTION OF PERSONAL DATA 1.- INTRODUCTION By entering your personal data, you give your consent to its incorporation into data files belonging to MAHOU, S.A. and CERVECERA INDEPENDIENTE, S.A., bo

Add to Reading List

Source URL: www.cervezasalhambra.com

Language: English - Date: 2016-02-25 08:30:08
982Data / Computing / Information technology / Computer access control / ISO/IEC 11179 / Knowledge representation / Records management / Nok Nok Labs / Authentication / Authenticator / Data type / Code

FIDO UAF Authenticator Metadata Statements v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-authnr-metadata-v1.0-ps20141208.html Pre

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2015-03-30 14:07:03
983Computing / Concurrent computing / Auditing / Distributed computing / Internal control / Audit / Data center

Invalid Traffic Detection and Filtration Guidelines Addendum October 15, 2015 – FINAL (Version 1.0) Invalid Traffic Detection and Filtration Guidelines Addendum

Add to Reading List

Source URL: mediaratingcouncil.org

Language: English - Date: 2016-04-15 15:12:41
984Computer security / Security / Data security / IT risk management / Risk analysis / BeyondTrust / Vulnerability / Threat / IT risk / Risk management / Asset

BeyondTrust Corporate Overview The leader in preventing data breaches from insider privilege abuse and external hacking attacks Reducing IT security risk with unmatched visibility and control The majority of data breache

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-02-10 11:33:29
985

Flexible Data Acquisition and Control station ADN42 Advanced Data Node For your specific acquisition and control needs:

Add to Reading List

Source URL: www.offcode.fi

Language: English - Date: 2015-03-16 06:12:43
    986Computing / Concurrency control / Transaction processing / Data management / Transactional memory / Parallel computing / Computer memory / Software transactional memory / Rock / Benchmark / Lock / Linearizability

    Understanding Transactional Memory Performance Donald E. Porter and Emmett Witchel The University of Texas at Austin {porterde,witchel}@cs.utexas.edu Abstract—Transactional memory promises to generalize transactional p

    Add to Reading List

    Source URL: www3.cs.stonybrook.edu

    Language: English - Date: 2010-08-31 00:38:57
    987Internet protocols / Network protocols / Financial Information eXchange / Financial software / Market data / Transport Layer Security / HotSpot / HTML element / Communications protocol / Transmission Control Protocol

    Microsoft Word - FIXLINKRFQ_Spec_20160324.docx

    Add to Reading List

    Source URL: www.hotspotfx.com

    Language: English - Date: 2016-03-29 14:24:55
    988Computing / Prevention / Security / Cryptography / Crime prevention / Information governance / National security / Cloud computing / Data center / Information security / Risk management / Business continuity

    Guidelines | Technical Infrastructure hosting Gaming and Control Systems Remote Gaming December 2015

    Add to Reading List

    Source URL: www.mga.org.mt

    Language: English - Date: 2015-12-17 04:12:52
    989Sampling / Survey methodology / Algorithm / Geographic information system / Transmission Control Protocol

    Intro Puzzles Sampling Sketches Graphs Lower bounds Summing up Thanks! Algorithms for data streams Irene Finocchi http://www.dsi.uniroma1.it/∼finocchi/

    Add to Reading List

    Source URL: wwwusers.di.uniroma1.it

    Language: English - Date: 2012-05-09 09:13:39
    990Computing / Transaction processing / Data management / Data / Concurrency control / Databases / Database management systems / Isolation / Snapshot isolation / Serializability / Consistency model / Database transaction

    Highly Available Transactions: Virtues and Limitations (Extended Version) Peter Bailis, Aaron Davidson, Alan Fekete† , Ali Ghodsi, Joseph M. Hellerstein, Ion Stoica UC Berkeley and † University of Sydney arXiv:1302.

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2013-10-07 21:52:59
    UPDATE