Critical Software

Results: 1293



#Item
161Software development process / Application software / Software / Computing / Product management / Agile software development / DevOps / Information technology management

Ben Kepes Righting the Wrongs Error Reporting as a critical part of Enterprise IT

Add to Reading List

Source URL: diversity.net.nz

Language: English - Date: 2015-05-06 21:12:32
162Hashing / FIPS 140-2 / HMAC / Microsoft CryptoAPI / Advanced Encryption Standard / Critical Security Parameter / FIPS 140 / SHA-2 / Key Wrap / Cryptography / Cryptographic software / Cryptography standards

HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:09:52
163Crime prevention / Hacking / Cryptography / Cyberwarfare / SCADA / Vulnerability / Idaho National Laboratory / Malware / Computer insecurity / Security / Computer security / National security

CyberSafety: On the Interactions between CyberSecurity and the Software Engineering of Safety-Critical Systems C.W. Johnson, Department of Computing Science, University of Glasgow, Glasgow, Scotland, UK, G12 8RZ. johnson

Add to Reading List

Source URL: www.dcs.gla.ac.uk

Language: English - Date: 2011-06-02 08:43:05
164Process management / Marketing / Project management / Eliyahu M. Goldratt / Critical Chain / Critical chain project management / Throughput / Software development process / Throughput accounting / Management / Business / Theory of constraints

GLOSSARY AND KEY TERMS Balanced Scorecard​ : A performance report previously used in the state of Utah to help managers manage their operations. The balanced scorecard was discontinued

Add to Reading List

Source URL: gomb.utah.gov

Language: English - Date: 2015-04-09 09:47:22
165SUSE Linux / Software / Attachmate / SUSE Linux distributions / Technical support / Computing / System software / Novell NetWare / Novell / Provo /  Utah

Services Flyer Customized Help When You Need It Most: Premium Service Engineers When your IT environment is truly business-critical,

Add to Reading List

Source URL: www.suse.com

Language: English - Date: 2015-04-08 16:07:26
166Software / Fortinet / Application firewall / Virtual private network / Virtual appliance / Network security / Viaedge / Check Point / Computer network security / System software / Computing

FortiGate Virtual Appliances ® Consolidated Security for Virtual Environments FortiGate virtual appliances allow you to mitigate blind spots by implementing critical security controls within your virtual infrastructure.

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:07
167Mobile application development / Tru / Mobile business intelligence / Apperian / Computing / Software / Mobile web analytics

DATA SHEET CA Mobile App Analytics Mobile analytics done right At a Glance In today’s mobile application economy, providing the best user experience is critical to building customer loyalty.

Add to Reading List

Source URL: itworldcanada.com

Language: English - Date: 2015-05-04 16:02:30
168File managers / Backup / Data security / Computer file / Folder / Checkbox / Windows Vista / Microsoft Windows / Windows Explorer / System software / Software / Computing

Overview of this CrashPlan Guide This guide was created to help you ensure that CrashPlan is backing up your important and critical data and to assist you in restoring files. By default, the user folder that CrashPlan

Add to Reading List

Source URL: lsit.byu.edu

Language: English - Date: 2013-11-08 13:54:41
169Security / Computer security / Critical Software / Computing / Software / Computer network security / Software testing / Codenomicon

Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-06-08 10:21:12
170Security / Government / Critical infrastructure protection / Government procurement in the United States / Academi / Information Assurance Technology Analysis Center / Data & Analysis Center for Software / United States Department of Defense / National security / Defense Technical Information Center

Department of Defense Information Analysis Centers (DoD IACs) Quick Reference Sheet Current Basic Centers of Operation (BCOs) and Technical Area Tasks (TATs) Multiple Award Contracts (MACs) Cyber Security and Informatio

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2015-06-01 10:33:22
UPDATE