Software inspection

Results: 601



#Item
271Technology / Computer network security / Fortinet / Cyberoam / SVM / Electronics / Cisco Systems / WatchGuard / Support vector machine / Content-control software / Deep packet inspection / Computing

Next Generation Firewall (NGFW) Security Value MapTM Cisco (2) Cisco[removed]%

Add to Reading List

Source URL: www.watchguard.com

Language: English - Date: 2014-09-23 12:53:13
272Evaluation / Technology / Radiographic testing / Computed radiography / International Atomic Energy Agency / Industrial radiography / Inspection / Software development process / Nondestructive testing / Radiography / Science

Controlling the risk due to the use of gamma sources for NDT First feedback from the deployment of replacement NDT Techniques Etienne MARTIN (COFREND, France) IAEA Conference Vienna December[removed]Enhancing the protect

Add to Reading List

Source URL: www-ns.iaea.org

Language: English - Date: 2014-12-02 10:29:38
273Cybercrime / Internet censorship / Content filtering / Content-control software / Virtual private network / Deep packet inspection / Phishing / Malware / Internet censorship circumvention / Computer network security / Computing / Internet

SMALL MEDIA IRANIAN INTERNET INFRASTRUCTURE AND POLICY REPORT // February - March 2013

Add to Reading List

Source URL: smallmedia.org.uk

Language: English - Date: 2013-04-12 11:32:49
274Cross-platform software / Java virtual machine / Java applet / Java / Stack / Computing / Software / Java platform

IRM Enforcement of Java Stack Inspection∗ ´ Ulfar Erlingsson† Fred B. Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:58:38
275Requirement / Functional requirement / Software Requirements Specification / Traceability / Non-functional requirement / Requirements analysis / Requirement prioritization / Software development / Software requirements / Software

Inspection Checklist for Software Requirements Specifications Organization and Completeness Are all internal cross-references to other requirements correct?

Add to Reading List

Source URL: apps.adcom.uci.edu

Language: English - Date: 2014-11-13 16:27:21
276Inspection / Quality

INSPECT2 Product Bulletin Software & Products Division

Add to Reading List

Source URL: www.mistrasgroup.com

Language: English - Date: 2008-10-23 11:18:03
277Statistics / Inspection / Quality assurance / Visual inspection / Maintenance /  repair /  and operations / Reliability engineering / Maintenance / Knowledge / Science

Software & Products Division Asset Integrity & Reliability Software Product Bulletin

Add to Reading List

Source URL: www.mistrasgroup.com

Language: English - Date: 2008-10-23 11:19:59
278Actuarial science / Risk-based inspection / Maintenance / Statistics / Visual inspection / Inspection / Piping corrosion circuit / Management / Ethics / Risk

RBI Integrator Product Bulletin Software & Products Division

Add to Reading List

Source URL: www.mistrasgroup.com

Language: English - Date: 2008-10-23 11:17:38
279Software / Check Point / Deep packet inspection / Windows Server / Network security / BigFix / Symantec Endpoint Protection / Computer network security / Computing / Computer security

Datasheet: Endpoint Policy Management Unified Endpoint Security Management Enforce, manage, and report on endpoints from a single console.

Add to Reading List

Source URL: www.esc.de

Language: English - Date: 2013-04-03 10:18:53
280Computing platforms / Java programming language / Java virtual machine / Java / Stack / Call stack / Exception handling / Computing / Java platform / Cross-platform software

IRM Enforcement of Java Stack Inspection∗ ´ Ulfar Erlingsson deCODE Genetics Lyngh´als 1, 110

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:57:15
UPDATE