Search results

From KYNNpedia
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...61850]] series, [[IEC 61970]] series & [[IEC 61968]] series. The different security objectives include authentication of data transfer through [[digital signat * ''IEC 62351-3'' — Security for any profiles including [[TCP/IP]]. ...
    4 KB (539 words) - 09:07, 14 July 2023
  • :[[Computer file]] :[[Computer network]] ...
    2 KB (253 words) - 05:24, 29 January 2024
  • ...prets images. Video sensors use programmable [[algorithms]] running on a [[computer]]. ...se of video sensors is increasing. Two main applications are electronic [[security]] and [[market research]]. ...
    1 KB (138 words) - 12:01, 26 August 2023
  • | website = National Cyber Security Alliance (StaySafeOnline.org) ...uding the Computer Fraud and Abuse Act (CFAA) in the United States and the Computer Misuse Act in the United Kingdom.<ref>{{Cite web ...
    6 KB (741 words) - 06:46, 13 February 2024
  • ...l=https://books.google.com/books?id=pspnGbHFGLcC&pg=PA330 |page=330 |title=Computer Networks, A Systems Approach |first1=Larry L. |last1=Peterson |first2=Bruce ....com/books?id=B0e6BQAAQBAJ&pg=PA880 |page=880 |title=Quality, Reliability, Security and Robustness in Heterogeneous Networks |first=Karan |author=Singh |year=2 ...
    2 KB (276 words) - 02:51, 13 April 2023
  • | name = Forum of Incident Response and Security Teams ...UIDANCE FOR IMPROVING THE COMPARABILITY OF STATISTICS PRODUCED BY COMPUTER SECURITY INCIDENT RESPONSE TEAMS|url=https://www.oecd.org/officialdocuments/publicdi ...
    9 KB (1,233 words) - 15:30, 25 October 2023
  • === Computer systems === {{See also|Information and Communications Technology|Home computer}} ...
    7 KB (895 words) - 16:21, 8 January 2024
  • ==Security== | publisher=Clarkson University Department of Mathematics and Computer Science ...
    13 KB (1,730 words) - 03:20, 21 August 2023
  • ...e design, manufacture or operation of machinery, circuitry, electronics, [[Computer hardware|hardware]], or [[software]] that produces undesired results or imp ...f engineering jargon since the 1870s and predates electronic computers and computer software; it may have originally been used in hardware engineering to descr ...
    9 KB (1,309 words) - 04:57, 2 October 2023
  • === Computer hardware === * [[SCSI]] is an example of a digital system that is electrically a [[Computer bus|bus]], in the case of external devices, is physically wired as a daisy ...
    7 KB (1,033 words) - 01:59, 28 September 2023
  • ...urely]] keeping track of the creation and modification time of a document. Security here means that no one—not even the owner of the document—should be able to There are many timestamping schemes with different security goals: ...
    11 KB (1,571 words) - 20:46, 17 January 2024
  • ** [[Computer engineering]] ''([[Outline of computer engineering|outline]])'' ** [[Security engineering]] ...
    10 KB (998 words) - 19:22, 5 November 2023
  • ...easoning|knowledge]] that might result in loss of an advantage or level of security if disclosed to others.<ref>{{Cite journal |last1=Mothersbaugh |first1=Davi ...ndividual, [[trade secret]]s of a business or even the [[national security|security]] and international relations of a nation depending on the level of sensiti ...
    20 KB (2,812 words) - 14:22, 26 January 2024
  • ...e solution can be considered as "tamper proof". Often multiple levels of [[security]] need to be addressed to reduce the risk of tampering.<ref>{{cite conferen |conference= World Customs Organization, Security ...
    16 KB (2,478 words) - 03:32, 16 January 2024
  • ...rom auditing the physical security of data centers to auditing the logical security of databases, and highlights key components to look for and different metho ...nology security audit]] or a computer security audit. However, information security encompasses much more than IT. ...
    31 KB (4,435 words) - 09:48, 21 June 2023
  • {{Short description|Computer network protocol}} == Security == ...
    9 KB (1,218 words) - 21:04, 24 July 2023
  • ...Social Science". Science 323 (5915): 721–723</ref> [[network science]], [[Computer network|network engineering]] and [[Web science]]. By understanding the rol ===Internet security=== ...
    12 KB (1,672 words) - 16:20, 27 February 2024
  • ...'') are specific activities performed by persons or systems to ensure that computer systems operate in a way that minimises risk. They are a subset of an organ :*[[computer hardware|Hardware]]/[[software]] configuration, installation, testing, mana ...
    17 KB (2,318 words) - 20:13, 6 February 2024
  • ...Infrastructure]] environments that converge servers, storage, networking, security, management and facilities.<ref>[http://www.datacenterknowledge.com/archive *[[Information security]]<ref name="Rasmussen">{{citation |title=How to Become an IT Manager: What ...
    11 KB (1,453 words) - 23:47, 28 December 2023
  • ...nformation]] and services, such as [[electronic mail]], [[online chat]], [[Computer file|file]] transfer, and the interlinked [[Web page]]s and other documents *[[Transport Layer Security]] (TLS/SSL) &ndash; ...
    13 KB (1,576 words) - 12:01, 22 February 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)