The following is a list in alphabetical order of articles discussing various aspects of computer technology and computing.
“The NSA/CSS Threat Operations Center (NTOC) is the primary NSA/CSS partner for Department of...NSA/CSS Threat Operations Center
“A computer attack may be defined as actions directed against computer systems to disrupt...Computer attack
“Security measures are Security measures refers to the steps taken to prevent or minimize...Security measures
“The authorization boundary (also called the information system boundary) is ↑ NIST Special...Authorization boundary
“The purpose of system acceptance testing is to verify in an operational environment (either...System acceptance testing
“A scratchpad register is ↑ In re Bradley, 600 F.2d 807, 808 n.1, 202 U.S.P.Q. (BNA) 480...Scratchpad register
“Government Accountability Office, Auditing and Financial Management: Federal Information System...Auditing and Financial Management: Federal Information System Controls Audit Manual (FISCAM)
Pages in category "Computing"
The following 200 pages are in this category, out of 1,350 total.