Search results
Jump to navigation
Jump to search
Page title matches
- 35 bytes (3 words) - 15:25, 30 September 2009
- '''Integrity''', in [[information security]], refers to the assurance that data retrieve *Atomic integrity, or the assurance that an individual record is unchanged844 bytes (119 words) - 15:23, 30 September 2009
- 169 bytes (24 words) - 15:24, 30 September 2009
- | pagename = Integrity | abc = Integrity798 bytes (72 words) - 15:24, 30 September 2009
- 211 bytes (24 words) - 15:26, 30 September 2009
- The '''New European Schemes for Signatures, Integrity and Encryption''' project, better known as '''NESSIE''', was a project with548 bytes (78 words) - 05:48, 8 April 2024
- 12 bytes (1 word) - 22:08, 26 November 2010
- | pagename = New European Schemes for Signatures, Integrity and Encryption | abc = New European Schemes for Signatures, Integrity and Encryption2 KB (338 words) - 22:07, 26 November 2010
- 101 bytes (12 words) - 22:08, 26 November 2010
Page text matches
- ...[[architecture]]; the word is a [[linguistic blend]] of [[tension]] and [[integrity]].248 bytes (30 words) - 05:15, 3 September 2009
- | pagename = Integrity | abc = Integrity798 bytes (72 words) - 15:24, 30 September 2009
- #REDIRECT [[New European Schemes for Signatures, Integrity and Encryption]]75 bytes (9 words) - 21:56, 26 November 2010
- '''Integrity''', in [[information security]], refers to the assurance that data retrieve *Atomic integrity, or the assurance that an individual record is unchanged844 bytes (119 words) - 15:23, 30 September 2009
- ...ical ideology that privileges the advancement of a particular [[nation]]'s integrity and interests.140 bytes (18 words) - 17:13, 11 July 2009
- Confidence in, or reliance on the ability, integrity, strength, consistency or dependability of a person or thing.150 bytes (20 words) - 16:51, 26 February 2010
- Concerned with the integrity of a system as a whole (rather than that of its separate components).135 bytes (20 words) - 00:50, 26 April 2010
- ...with the [[security of information]], typically the [[confidentiality]], [[integrity]] and [[authenticity]] of some message.250 bytes (30 words) - 03:05, 21 May 2010
- ...ilitary dominated rule but maintaining a certain personal independence and integrity, if authoritarianism297 bytes (40 words) - 15:43, 29 November 2008
- ...and protective measures used to ensure appropriate [[confidentiality]], [[integrity]] and [[availability]] to information; usually assumed to be information in319 bytes (41 words) - 08:45, 13 September 2009
- ...thentication|source authentication and information security#integrity|data integrity protection; during a conversation, both players are assured that the other1 KB (174 words) - 07:34, 18 March 2024
- ...banks and other financial institutions and the purpose of preserving the integrity of the [[financial system]].209 bytes (30 words) - 12:30, 15 January 2010
- The '''New European Schemes for Signatures, Integrity and Encryption''' project, better known as '''NESSIE''', was a project with548 bytes (78 words) - 05:48, 8 April 2024
- {{r|Integrity||**}}428 bytes (56 words) - 08:52, 13 September 2009
- ...Morality, and Politics in the Hebrew Bible''; *"Religious Liberty and the Integrity of Piety," in ''Religious Liberty and Secularism'' (1998); *"Philosophy or524 bytes (70 words) - 12:36, 14 October 2009
- ...certain aspects of communications security#sequential integrity|sequential integrity.<ref name=RFC4302>{{citation }}</ref> The property of sequential integrity establishes that a sequence of information structures is correct: no record5 KB (761 words) - 16:22, 30 March 2024
- *Data integrity **Atomic integrity3 KB (360 words) - 16:21, 30 March 2024
- ...ptographic]] technique for providing [[information security#integrity|data integrity protection]] and [[information security#source authentication|source authen2 KB (313 words) - 05:49, 8 April 2024
- ...urotransmission, gastrointestinal motility, hemostasis, and cardiovascular integrity. Multiple receptor families (receptors, serotonin) explain the broad physio711 bytes (82 words) - 14:04, 13 February 2011
- integrity in communication and health care systems, management of argumentation and c705 bytes (90 words) - 03:44, 22 November 2023
- ...g to the official website, is to promote the game of football, protect its integrity and bring the game to all. In practice, FIFA governs worldwide football tou750 bytes (105 words) - 17:33, 11 March 2024
- ...}Never has there been a counsel with more intellectual courage or personal integrity,{{'}} David Brant, the former head of the Naval Criminal Investigative Serv ...}Never has there been a counsel with more intellectual courage or personal integrity,{{'}} David Brant, the former head of the Naval Criminal Investigative Serv5 KB (684 words) - 09:15, 22 February 2024
- | pagename = New European Schemes for Signatures, Integrity and Encryption | abc = New European Schemes for Signatures, Integrity and Encryption2 KB (338 words) - 22:07, 26 November 2010
- ...standard ciphers for the [[NESSIE]] (New European Schemes for Signatures, Integrity and Encryption) project.783 bytes (126 words) - 05:48, 8 April 2024
- ...and safety systems that does not interfere with the building's [[historic integrity]].1,016 bytes (144 words) - 13:51, 3 November 2007
- ==Verification of file integrity==4 KB (586 words) - 15:45, 8 April 2024
- ...articular emphasis on high speed printed circuit board signal analysis and integrity. I have six years of experience in high speed design and analysis. I hold863 bytes (129 words) - 02:43, 22 November 2023
- ...caution of intelligent tinkering''. <ref>Temple, S., 1997. Maintaining the integrity of managed ecosystems, IN: (M.S. Boyce and A. Haney, eds.) Ecosystem Manage ...ld's Golden Rule states, "''A thing is right when it tends to preserve the integrity, stability and beauty of the biotic community. It is wrong when it tends o3 KB (409 words) - 13:06, 9 August 2023
- ...ell fates. The cells may undergo [[necrosis]], in which they lose membrane integrity and die rapidly as a result of [[cell lysis]]. The cells can stop actively ...undergo secondary necrosis. They will shut down metabolism, lose membrane integrity and lyse.<ref name=apoptosis/><ref name=riss1>{{cite journal |author=Riss T6 KB (910 words) - 13:52, 23 May 2012
- ...expressed his concern that use of Van Vechten's photographs "preserve the integrity" of his work, i.e, that photographs not be colorized or cropped, and that p1 KB (170 words) - 01:05, 5 August 2007
- *Transparency and Integrity Under the Transparency and Integrity initiative is an Academic Freedom area, which focuses on two clusters of th3 KB (430 words) - 11:01, 15 April 2024
- | title = SCIENTIFIC INTEGRITY: Responding to Possible Plagiarism1 KB (187 words) - 14:55, 24 July 2015
- ...sons who practice vegetarianism are usually concerned with maintaining the integrity of vegetables both for aesthetic, taste and nutritional reasons, all of whi1 KB (199 words) - 13:02, 8 July 2011
- ...authorized and whose authorizations are authenticated, to resources whose integrity also may need to be autheticated. In principle, all user-resource interacti2 KB (232 words) - 16:21, 30 March 2024
- ...d compression). "Continuous" means that ruptures (breaking of the object's integrity) and splicing or glueing (matching object's points) do not happen. Topology1 KB (206 words) - 14:09, 29 December 2008
- Sinkholes form when erosion in the flow of water, underground, undermines the integrity of the surface.<ref name=":0">{{Cite book|last=Williams|first=Paul|url=http2 KB (217 words) - 01:42, 31 January 2024
- ...m, L. Fletcher, "Hydrostatic strength test endpoints", Journal of Pipeline Integrity (Q3 2006)1 KB (204 words) - 04:49, 22 November 2023
- A low-impact system must have impairment to availability, confidentiality and integrity all rated in the low category of FIPS 199: "limited adverse effect on organ2 KB (178 words) - 11:59, 20 September 2009
- ...the prestigious international Information Technology Award for his work on integrity protection. In the 1990s, he developed protection testing and audit techniq ...and scope. With almost 30 years of experience and a global reputation for integrity, accuracy, and innovation, Fred Cohen is widely considered one of the world5 KB (770 words) - 03:52, 22 November 2023
- those you see as police merely maintain the integrity, and get rid of garbage entered by not such nice visitors. The only ones th1 KB (230 words) - 23:07, 22 February 2007
- There are also variants in the keying methods used. TKIP for Temporal Key Integrity Protocol was the original protocol in WPA, a stopgap required because WEP w2 KB (248 words) - 05:48, 8 April 2024
- {{r|Partnership for Research Integrity in Science and Medicine}}2 KB (256 words) - 16:41, 14 February 2011
- * obtain the sender's public key and authenticate its integrity and source2 KB (277 words) - 05:48, 8 April 2024
- ====Integrity==== =====Content integrity=====13 KB (2,000 words) - 16:21, 30 March 2024
- ...SH) can, for example, be used in medical diagnostics to assess chromosomal integrity. RNA ISH (hybridization histochemistry) is used to measure and localize mRN2 KB (313 words) - 20:47, 18 July 2010
- ...-reviewed journals in biomedical sciences to discuss issues related to the integrity of the scientific record. COPE publishes guidelines on good practice for ed3 KB (470 words) - 14:21, 18 November 2009
- ...racy and neutrality over sheer number of articles. With due regard to the integrity and usability of information, we incorporate advanced knowledge navigation,2 KB (301 words) - 23:21, 22 September 2010
- ...nese Government, with the object of effectively preserving the territorial integrity of China, agree to the following article: The Chinese Government engage not2 KB (340 words) - 18:02, 30 August 2010
- With cryptographic computers, there is no need to maintain the integrity of individual characters. The main types of cipher are a [[block cipher]], ...integrity|atomic integrity]] to messages, but does not provide sequential integrity, so that messages could be deleted or duplicated without fear of detection.12 KB (1,744 words) - 05:48, 8 April 2024
- ...er science technique, in the design of transaction processing and database integrity. A number of the mathematical topics, created do have computer science, and2 KB (332 words) - 16:15, 23 December 2008