Control Data Institute

Results: 324



#Item
171Telecommunications engineering / Differentiated services / Data management / Knowledge representation / Technical communication / Quality of service / Bandwidth Broker / Metadata / Computer network / Internet / Network architecture / Computing

Proc. Int’l. Conf. on Dublin Core and Metadata Applications[removed]Priority Control Mechanism managed by Metadata Rei S. Atarashi Communications Research Laboratory/Nara Institute of Science and Technology[removed]Nukui-K

Add to Reading List

Source URL: dublincore.org

Language: English - Date: 2014-12-09 22:35:09
172Gender studies / Gender / Bibliographic databases / Metadata / Technical communication / HathiTrust / MARC standards / Authority control / Grammatical gender / Information / Library science / Data

Author Gender Metadata Augmentation of HathiTrust Digital Library Zong Peng, Miao Chen, Stacy Kowalczyk, Beth Plale Data to Insight Center, Indiana University Pervasive Technology Institute 2079 E 10th St, Bloomington, I

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2014-11-13 13:58:08
173Security / Computer security / Information technology governance / Auditing / Risk / COBIT / Information Systems Audit and Control Association / Information security management / Certified Information Security Manager / Data security / Information technology management / Information technology audit

10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:48:57
174Professional associations / Information / Copyright law / Institute of Electrical and Electronics Engineers / Copyright / Transmission Control Protocol / Requirement / Attribution / Engineering / Standards organizations / Data / International nongovernmental organizations

To be submitted on the letterhead of the company or institution granting permission

Add to Reading List

Source URL: standards.ieee.org

Language: English - Date: 2014-09-18 12:21:35
175Cloud storage / Data center / Data management / Distributed data storage / Networks / Cloud computing / Shared services / Infrastructure / Email / Computing / Concurrent computing / Distributed computing

Information Technology Control Framework in the Federal Government – Considerations for an Audit Strategy Presentation to The Institute of Internal Auditors Breakfast Session

Add to Reading List

Source URL: chapters.theiia.org

Language: English - Date: 2014-02-24 11:27:05
176Computing / NIST Special Publication 800-53 / National Institute of Standards and Technology / Information security / Cyber security standards / Control system security / Computer security / Security / Data security

Microsoft PowerPoint - Ross_NIST_Special_Publication.pptx

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-02-05 13:53:57
177Rochester Institute of Technology / Filesystem permissions / Electronic Arts / EA / Computing / Software / Video game development / Association of Independent Technological Universities / Middle States Association of Colleges and Schools

Restricted Data Protection through Access Control Lists Sam Trahan May 18, 2012

Add to Reading List

Source URL: www.emc.ncep.noaa.gov

Language: English - Date: 2012-05-18 12:24:40
178Alcohol abuse / Demography / Population / Centers for Disease Control and Prevention / Cirrhosis / Mortality Medical Data System / National Center for Health Statistics / International Statistical Classification of Diseases and Related Health Problems / Alcoholic hepatitis / Medicine / Health / Hepatology

National Institute on Alcohol Abuse and Alcoholism SURVEILLANCE REPORT #100

Add to Reading List

Source URL: pubs.niaaa.nih.gov

Language: English - Date: 2014-12-17 09:25:38
179Computer security / Aglets / Mobile agent / PERMIS / X.509 / Software agent / Public key certificate / Authorization certificate / Privilege Management Infrastructure / Cryptography / Public-key cryptography / Key management

Privilege Management of Mobile Agents Wayne Jansen, Tom Karygiannis National Institute of Standards and Technology Abstract: Most mobile agent systems use internal data structures within an agent to control and specify i

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
180Computer security / Cloud computing / Identity management / Access control / IBM cloud computing / Hitachi Data Systems / Security / Computing / Computer network security

ABOUT US Work With Us CURRENT PROJECTS We guide U.S. businesses to stronger cybersecurity practices The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-30 15:24:10
UPDATE