Critical Software

Results: 1293



#Item
91Technology / Mobile technology / Geography / Atlases / Cartography / DeLorme / GIS software / Global Positioning System / Yarmouth /  Maine / Iridium Communications / Short Message Service / Iridium satellite constellation

Page 1 of 2 2016_1 CRITICAL INFORMATION SUMMARY INREACH EXPEDITION PLAN

Add to Reading List

Source URL: alwaysinreach.com.au

Language: English - Date: 2016-01-21 19:20:57
92Information technology management / Project management / IT portfolio management / Application portfolio management / Program management / Agile software development / Strategic management / Project portfolio management / Enterprise project management

DAPTIV FOR IT GOVERNANCE “Managing the portfolio and ensuring that IT is aligned with the business —that’s absolutely critical. We need to ensure we’re prioritizing properly alongside the business.” Susan Klei

Add to Reading List

Source URL: www.daptiv.com

Language: English - Date: 2014-02-14 16:55:10
93

NRI 技術創発 基幹業務システムにおける オープンソースミドルウェアの活用 Application of the Open Source Middleware/Software in a Mission Critical Business System

Add to Reading List

Source URL: www.nri.com

Language: Japanese - Date: 2004-11-07 17:45:04
    94Computer security / Security / Computer network security / Computing / Software testing / Codenomicon / Coriant / Vulnerability management

    Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:14
    95

    Sex Differences in Intrinsic Aptitude for Mathematics and Science? A Critical Review Elizabeth S. Spelke Harvard University

    Add to Reading List

    Source URL: software.rc.fas.harvard.edu

    Language: English - Date: 2015-08-24 13:43:52
      96Computing / Software / Statistical classification / Machine learning / Secure communication / Internet privacy / Parts of speech / Tor / Naive Bayes classifier / Deep packet inspection / Supervised learning / Facebook

      A Critical Evaluation of Website Fingerprinting Attacks Marc Juarez1 , Sadia Afroz2 , Gunes Acar1 , Claudia Diaz1 , Rachel Greenstadt3 1 KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium

      Add to Reading List

      Source URL: securehomes.esat.kuleuven.be

      Language: English - Date: 2014-10-01 09:30:05
      97Computing / Software / System software / Computer systems / Network management / Security / Log analysis / Login / Windows Security Log / Event Viewer / Password / Logfile

      Critical Log Review Checklist for Security Incidents

      Add to Reading List

      Source URL: www.securitywarriorconsulting.com

      Language: English - Date: 2010-03-23 02:04:48
      98Management / ERP software / Business software / Information technology management / Enterprise resource planning / Manufacturing / Customer relationship management / Project management / Comparison of PSA systems / Professional services automation

      Daptiv for Professional Services Automation “As a professional services organization, executing on services engagements profitably is critical to our success. Daptiv’s flexibility and ease of use gives us the abilit

      Add to Reading List

      Source URL: www.daptiv.com

      Language: English - Date: 2013-06-14 14:04:28
      99

      C++ for Safety-Critical Systems Günter Obiltschnig Applied Informatics Software Engineering GmbH St. PeterSt. Jakob im Rosental

      Add to Reading List

      Source URL: www.appinf.com

      Language: English - Date: 2009-01-20 02:45:22
        100

        Detecting Hidden Logic Bombs in Critical Infrastructure Software

        Add to Reading List

        Source URL: cisr.nps.edu

        Language: English - Date: 2012-03-26 14:41:48
          UPDATE