Data integrity

Results: 897



#Item
141Computer security / Data security / Information sensitivity / Information security / Freedom of information legislation / Data Protection Act / Confidentiality / Public records / Classified information / Security / Ethics / National security

Records Management Guidance: Access to information 1. The aims of Information Security and Records Management include ensuring the availability, integrity and confidentiality of information. It is vital for the Universit

Add to Reading List

Source URL: www.exeter.ac.uk

Language: English - Date: 2014-10-04 15:27:54
142Audit / Business / Auditing / Information technology audit / Continuous auditing

CENX Data Audit Service CENX’s Data Audit Service allows service providers to ensure data integrity by auditing data from a wide variety of network elements, IT systems, and other disparate sources such as OSS and next

Add to Reading List

Source URL: www.cenx.com

Language: English - Date: 2015-04-21 04:42:54
143Error detection and correction / Cksum / Data corruption / CRC / Finite fields / Computing / Checksum / Data Integrity Field

Accredited Standards Committee* InterNational Committee for Information Technology Standards (INCITS) Doc. No.: T10/03-281r0 Date: August 20, 2003 Reply to: John Lohmeyer To:

Add to Reading List

Source URL: www.t10.org

Language: English - Date: 2003-08-20 02:00:00
144Computing / Mathematics / Data integrity / Control flow / Hoare logic / Data management / Program logic / Computer programming / Invariant

Unifying Facets of Information Integrity Arnar Birgisson, Alejandro Russo, and Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden Abstract. Information integrity is a vital security property in

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-11-25 05:03:14
145Electronic design automation / Computer memory / Data transmission / Digital circuits / Multiplexer / Flip-flop / Signal integrity / Clock signal / Dynamic random-access memory / Electronic engineering / Electronics / Digital electronics

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-02-06 11:50:34
146Database management systems / Backup / Data security / Data integrity / Database / Alcator C-Mod / IBM Tivoli Storage Manager / Data management / Data / Information

PDF Document

Add to Reading List

Source URL: www.psfc.mit.edu

Language: English - Date: 2014-07-29 10:38:37
147Cyberwarfare / Software quality / Fuzz testing / Hacking / Vulnerability / Buffer overflow / Uncontrolled format string / Computer network security / Software testing / Computer security / Software bugs

Software Vulnerability • Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the data and appl

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
148Systems engineering / Electronic commerce / Government procurement / E-procurement / Auctioneering / Federal procurement data system / Call for bids / Purchasing / Government procurement in the European Union / Business / Procurement / Supply chain management

COMPENDIUM OF GOOD PRACTICES for INTEGRITY IN PUBLIC PROCUREMENT PREPARED BY THE oecd Introduction Acknowledging that corruption is a threat to markets, trust in government, and the rule of law, and that fighting corru

Add to Reading List

Source URL: www.g20australia.org

Language: English - Date: 2014-11-08 01:31:00
149Cluster computing / Hewlett-Packard / OpenVMS / Extensible Storage Engine / Windows Management Instrumentation / HP Integrity Servers / Load / HP-UX / Snapshot / Computing / Computer storage / Fault-tolerant computer systems

WBEM/WMI Provider Data Sheet Utilization Provider Provider overview Description

Add to Reading List

Source URL: www.openvms.compaq.com

Language: English - Date: 2011-02-11 17:26:05
150Academia / European Science Foundation / Science and technology in Europe / United States Office of Research Integrity / Research / All European Academies / Scientific method / Plagiarism / Data sharing / Science / Scientific misconduct / Knowledge

ResearchIntegrity_20p.A4.indd

Add to Reading List

Source URL: www.oeawi.at

Language: English - Date: 2012-12-19 14:22:13
UPDATE