Search results
Jump to navigation
Jump to search
- ...exist, without actually segregating data into different tables, schemas or databases. A typical application is constraining sites, [[Departmentalization|departm ...10773/apdvpoli.htm Using Virtual Private Database to Implement Application Security Policies] ...1 KB (186 words) - 10:41, 5 September 2021
- ...ting a private link to the database.<ref>{{cite web| publisher=Application Security Inc.| url=http://www.appsecinc.com/resources/alerts/oracle/2006-01A.shtml | ...uses private database links to connect to [[Remote Database Access|remote databases]]. The December 29 variant was posted incomplete, without a spreading mecha ...2 KB (317 words) - 18:12, 2 January 2025
- ...tegration]], [[information extraction]], networking, [[program analysis]], security, and [[cloud computing]].<ref>[http://www.cs.ucdavis.edu/~green/papers/sigm Deductive databases reuse many concepts from logic programming; rules and facts specified in Da ...3 KB (454 words) - 02:53, 25 May 2025
- databases.<ref>Dzeroski, Saso, [[Nada Lavrač|Lavrač, Nada]] (Eds.), Relational Data M ...MRAR: Mining Multi-Relation Association Rules]'', Journal of Computing and Security, 1, no. 2 (2014)</ref> ...3 KB (395 words) - 19:43, 25 June 2025
- ...transaction processing) system. Modern decision, and classical statistical databases are often closer to the [[relational model]] than the [[multidimensional da Statistical databases typically contain parameter data and the measured data for these parameters ...6 KB (771 words) - 22:52, 9 January 2025
- ...en popularized by [[Bruce Schneier]], a [[cryptography|cryptographer]] and security consultant.<ref name="ATLANTIC">[http://charlesmann.org/articles/Homeland-I ...as [[credit card]] databases) protected only by a [[password]]. Once this security is breached, all data can be accessed. ...5 KB (726 words) - 04:56, 2 November 2024
- * [[Network Service Name]], for accessing a databases in [[Oracle Net Services]] * [[National Security Network]], an American foreign-policy think tank ...882 bytes (108 words) - 14:39, 13 April 2024
- | competencies = Databases, RDBMS, SQL, distributed computing, operating systems, storage technologies ...[[Data migration|migration]], performance monitoring, [[Database security|security]], [[troubleshooting]], as well as [[backup]] and [[data recovery]].<ref na ...5 KB (668 words) - 03:37, 10 December 2024
- ...n-profit organization funded by the United States [[Department of Homeland Security]]. A significant participant was [[Cyc]], which encoded the knowledge base == Incident databases == ...5 KB (662 words) - 23:02, 15 December 2024
- ...Laboratory under Contract No. 89233218CNA000001 with the National Nuclear Security Agency (NNSA) of the U.S. Department of Energy (DOE). The U.S. Government h |publisher= Los Alamos National Security (National Nuclear Security Administration (NNSA)) ...6 KB (807 words) - 23:49, 23 September 2024
- ...program, [[Project RESISTANCE]] were both coordinated by the CIA Office of Security. In addition, the twin projects were branch operations that relayed civilia [[Category:Government databases in the United States]] ...2 KB (238 words) - 02:22, 19 May 2025
- {{Short description|Centralized unit that deals with security issues on an organizational and technical level}} {{For|a similar concept in computing|information security operations center}} ...4 KB (522 words) - 06:49, 25 July 2024
- == Operating system security == In [[Operating system#Security|Operating system security]], polyinstantiation is the concept of creating a user or process specific ...3 KB (467 words) - 02:43, 7 September 2024
- # IP Security (IPSec) ...h speeds in advanced networks. Knowledge-based processors contain embedded databases that store information required to process packets that travel through a ne ...3 KB (397 words) - 20:50, 19 November 2024
- {{Short description|Database from the US Social Security Administration}} ...al Security Number]] (SSN) and whose death has been reported to the Social Security Administration are listed in the SSDI.<ref name=DMF2018>{{cite web|access-d ...7 KB (1,034 words) - 02:48, 22 January 2025
- ...se distributed databases store data across multiple computers, distributed databases may improve performance at [[end-user]] worksites by allowing transactions Two processes ensure that the distributed databases remain up-to-date and current: [[Replication (computing)|replication]]<ref> ...8 KB (1,046 words) - 15:44, 25 August 2025
- ...f> In particular, it would use the [[INSEE code]] (also used as a [[Social Security number]]). The system was to be based on the Iris-80 computer. *[[Government databases]] ...3 KB (424 words) - 20:51, 27 February 2025
- [[Category:Terrorism databases]] [[Category:United States Department of Homeland Security]] ...3 KB (364 words) - 14:28, 22 September 2024
- * <code>[[.odb]]</code> file extension for OpenDocument format databases * Offense–defense balance, a theory concerning the [[security dilemma]] ...1 KB (155 words) - 05:51, 22 February 2025
- ...n program, [[Project MERRIMAC]] were both coordinated by the CIA Office of Security. In addition, the twin projects were branch operations that relayed civilia [[Category:Law enforcement databases in the United States]] ...2 KB (229 words) - 22:00, 10 December 2021