Computer data

Results: 44615



#Item
981Computing / Data management / Communications protocol / Data transmission / Computer networking / Data / Computer security / Telecommunications engineering / Data center / Information security

University of New Mexico IT Network Design Recommendations Fall, 2012 Prepared by:

Add to Reading List

Source URL: cio.unm.edu

Language: English
982System software / Computer architecture / Software / Computer data storage / Disk file systems / Volume manager / Fdisk / OS/2 / Logical volume management / Disk formatting / Dd / Logical Volume Manager

Inspection and maintenance tools Inspection and maintenance tools Gerard Braad Continued operation

Add to Reading List

Source URL: gbraad.gitlab.io

Language: English - Date: 2016-07-26 23:21:30
983Computer security / Computing / Computer network security / Cyberwarfare / Security / Videotelephony / Data security / Integrated Services Digital Network / Network access / Security Target / Firewall / Oids

gsmyndigheten for IT-sikkerhet Norwegian Certificattion Authority for IT Security Sertifisering SERTIT T-012 MR Main ntena

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:40
984Computing / Data / Records management / Information technology / Data management / Archive formats / IBM software / SPSS / Zip / UK Data Archive / Computer file / Archive file

Data Processing Quick Reference

Add to Reading List

Source URL: www.data-archive.ac.uk

Language: English - Date: 2016-07-15 05:45:43
985Mathematics / Computer arithmetic / Smalltalk / Number / Single-precision floating-point format / Primitive data type / Continued fraction / Q / Arbitrary-precision arithmetic / Floating point / Fixed-point arithmetic / Real number

Introduction to Smalltalk - Chapter 5 - Numbers  Ivan TomekChapter 5 - Numbers Overview VisualWorks library contains many classes representing numbers of various kinds, mainly because

Add to Reading List

Source URL: sdmeta.gforge.inria.fr

Language: English - Date: 2014-10-09 10:38:17
986Computing / Network architecture / Ethernet / Computer architecture / Forwarding information base / Network switch / Virtual LAN / Broadcast radiation / Forwarding plane / TRILL / Dell Networking / Multi-link trunking

PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya, and Amin Vahdat

Add to Reading List

Source URL: nathanfarrington.com

Language: English - Date: 2016-02-22 00:30:08
987Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2015-03-08 23:14:44
988Computer programming / Software engineering / Software / Data types / C / Linked lists / Binary trees / Struct / Tree / Node / GNU Compiler Collection / Pointer

Reprinted from the Proceedings of the GCC Developers’ Summit June 2nd–4th, 2004

Add to Reading List

Source URL: research.owlfolio.org

Language: English - Date: 2016-04-20 11:44:16
989Prevention / Computer security / Safety / Security / Data security / Data Quality Act / Information security / Privacy / National Oceanic and Atmospheric Administration

Department of Commerce $ National Oceanic & Atmospheric Administration $ National Marine Fisheries Service

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2014-09-02 12:10:03
990Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
UPDATE