Search results

Jump to navigation Jump to search
Results 1 – 21 of 262
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • * Compliance with [[security policies]] * Security incident response ...
    5 KB (752 words) - 11:45, 20 April 2023
  • # ''Security'': Messages must be encrypted if they travel over public interfaces. Messa ...ed differently. For example, some messages may have different priority or security policies. ...
    5 KB (710 words) - 10:14, 22 June 2025
  • ...f''' ('''COTS''') products are packaged or canned (ready-made) hardware or software, which are adapted aftermarket to the needs of the purchasing organization, .../2.101|access-date=2022-06-22}}</ref> For example, [[Microsoft]] is a COTS software provider. Goods and construction materials may qualify as COTS but bulk car ...
    12 KB (1,665 words) - 00:02, 9 May 2025
  • {{Infobox software ...upport/kb/article.php?id=1000305&lang=en|title=History of changes: Outpost Security Suite Pro|publisher=Agnitum|access-date=2015-06-22|archive-url=https://web. ...
    10 KB (1,379 words) - 08:14, 15 June 2025
  • {{short description|Class of network management software}} ...m/books?id=eomJgz8J6jEC&pg=PA159 |pages=159–161 |title=Implementing 802.1X Security Solutions for Wired and Wireless Networks |author=Jim Geier |year=2008 |isb ...
    8 KB (1,033 words) - 23:52, 18 March 2025
  • {{Short description|Free software backup utility}} {{about|computer backup software|the penile bone found in some mammals|baculum|the genus of sea snail|Bacula ...
    9 KB (1,259 words) - 17:19, 17 May 2025
  • {{Short description|Software to run Windows and Linux simultaneously}} {{Infobox software ...
    9 KB (1,331 words) - 08:36, 29 August 2024
  • The term "[[Email security#Privacy concerns|Email security]]" refers to the protection of email from [[Computer virus|viruses]] and [[ ...ox (computer security)|Sandbox]] !![[Email security#Privacy concerns|Email security]] !![[Antispam]] !![[Web filter|Web protection]] !!Macro protection !!Live< ...
    48 KB (5,202 words) - 08:14, 15 June 2025
  • ...act to protect the bulk of the user's files from potentially untrustworthy software such as [[Trojan horse (computing)|Trojan horses]] or other forms of [[malw ...nd later versions of [[macOS]] use a powerbox to allow [[sandbox (computer security)|sandboxed]] applications to open and save files.<ref>{{cite web|url=https: ...
    5 KB (773 words) - 14:15, 27 January 2025
  • ...Trusted Computing]]'', an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporat == Nature and limits of security == ...
    19 KB (2,779 words) - 11:35, 18 June 2025
  • ...] (FOSS) – and [[closed source]] are two approaches to the distribution of software. ...crosoft Windows|Windows]] and [[Microsoft Office]], along with other major software companies, have long been proponents of this business model, although in Au ...
    21 KB (2,966 words) - 15:23, 26 May 2025
  • ! [[software license|License]] | [[Proprietary software|Proprietary]] ...
    15 KB (1,883 words) - 03:16, 11 April 2022
  • {{about|the software|the comic|Grease Monkey|other uses|Grease monkey (disambiguation)}} {{Infobox software ...
    14 KB (1,967 words) - 18:52, 9 September 2024
  • ===Serial number comparisons=== Serial number comparisons are intended to use [[Serial Number Arithmetic]] as defined in RFC 1982. H ...
    14 KB (2,097 words) - 17:39, 24 May 2025
  • ...ualization software''' refers to both application [[virtual machine]]s and software responsible for implementing them. Application virtual machines are typical ![[Secure coding|Code security]] ...
    17 KB (2,226 words) - 03:19, 22 June 2025
  • An '''SSH client''' is a software program which uses the [[secure shell]] protocol to connect to a [[Server ( ! rowspan="2" | [[Software license|License]] ...
    25 KB (3,120 words) - 23:38, 18 March 2025
  • ![[Transport Layer Security]] ! {{rh}} |[[Bonjour (software)|Bonjour]] ...
    22 KB (2,767 words) - 15:09, 26 May 2025
  • ...licable to measurement, supply chain, software development, healthcare and security. ...or ''metrological traceability'' is used to refer to an unbroken chain of comparisons relating an [[Measuring instrument|instrument]]'s [[measurement]]s to a kno ...
    18 KB (2,508 words) - 20:57, 15 September 2025
  • ...(lock)|door locks]]. Terms that are primarily used by the U.S. [[National Security Agency]] are marked ''(NSA)''. For classification of keys according to thei ...dware_security_module_hsm_integration|title = Chapter 5. Barbican Hardware Security Module (HSM) Integration Red Hat OpenStack Platform 15}}</ref> ...
    9 KB (1,412 words) - 00:41, 29 April 2025
  • ...e also|Collaborative development environment|Comparison of version-control software}} ...ject documentation. Software authors generally retain their copyright when software is posted to a code hosting facilities. ...
    33 KB (4,105 words) - 02:41, 20 June 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)