Search results

Jump to navigation Jump to search
  • {{r|Computer security}}
    3 KB (441 words) - 12:55, 13 November 2014
  • In [[computer science]], and in particular [[computer security]] and [[code generation]], the use of '''canary values''' is a strategy to * [[computer security]]
    3 KB (380 words) - 05:48, 8 April 2024
  • ...s and practices, serving as a national resource in software engineering, [[computer security]], and [[process improvement]]. The SEI works closely with defense and gove
    690 bytes (91 words) - 18:17, 14 November 2007
  • ...s offer [[online service]]s free of charge. However, people who want to [[computer security|exploit]] those services will often attempt to write a computer program tha
    3 KB (388 words) - 20:29, 22 March 2011
  • '''Eldon Spickerhoff''' is a [[Canadian people|Canadian]] [[computer security]] expert.<ref name=cbc2018-10-04/>
    5 KB (583 words) - 20:43, 19 May 2022
  • ...Amendment, which has been vital for hackers and those with an interest in computer security ([[Dan Bernstein]], [[2600 Magazine]] and [[DeCSS]]).
    2 KB (353 words) - 12:47, 22 March 2009
  • detail. (A former official at NSA's National Computer Security Center told
    7 KB (1,186 words) - 14:20, 8 March 2024
  • [[Runa Sandvik]] and [[Michael Auger]], computer security experts, spent some time with one of these rifles, and found it was relativ
    6 KB (769 words) - 21:56, 25 August 2022
  • The media have generally painted hackers as [[computer security]] criminals. Some proponents of the original meaning of the term "hacker" (
    6 KB (943 words) - 05:48, 8 April 2024
  • detail. (A former official at NSA's National Computer Security Center told
    8 KB (1,338 words) - 05:49, 8 April 2024
  • ...ffer, overwriting other data. This error is the most commonly exploited [[Computer security]] flaw, and its prevalence is due to the common use of languages such as [[ ...stion. This simple concept has had profound implications in the annals of computer security.
    9 KB (1,329 words) - 05:48, 8 April 2024
  • ...ough programmer errors, these topics have gained in importance in studying computer security issues.
    8 KB (1,334 words) - 18:04, 20 March 2009
  • Many attacks on computer security try to get the computer to do something for the [[miscreant]], perhaps give
    6 KB (1,051 words) - 05:48, 8 April 2024
  • Guidance for implementing FISMA comes from the Computer Security Resource Center, Computer Systems Division, National Institute of Standards | publisher = Computer Security Resource Center, Computer Systems Division, National Institute of Standards
    20 KB (2,779 words) - 13:29, 20 March 2023
  • ...rk units into the final result. Additionally, to prevent result forging [[computer security|attacks]] the master must attempt to identify incorrect results and reduce
    11 KB (1,565 words) - 15:12, 10 June 2010
  • This sort of attack raises the stakes; it is not just a general threat to computer security, but a very specific threat to high-value secrets. The effort involved gene
    12 KB (1,977 words) - 08:55, 22 April 2024
  • ...hy has become a widely used tool in communications, computer networks, and computer security generally. The security of many modern cryptographic techniques is based on
    9 KB (1,312 words) - 05:49, 8 April 2024
  • ...essential part of [[communications intelligence]] and of some attacks on [[computer security]]. Often, the attacker's goal is to read material which the cryptosystem's For further discussion, see [[computer security]].
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...essential part of [[communications intelligence]] and of some attacks on [[computer security]]. Often, the attacker's goal is to read material which the cryptosystem's For further discussion, see [[computer security]].
    32 KB (4,916 words) - 05:49, 8 April 2024
  • | last = National Computer Security Center
    36 KB (5,247 words) - 05:49, 8 April 2024
View ( | ) (20 | 50 | 100 | 250 | 500)