Search results
Jump to navigation
Jump to search
- {{r|Computer security}}3 KB (441 words) - 12:55, 13 November 2014
- In [[computer science]], and in particular [[computer security]] and [[code generation]], the use of '''canary values''' is a strategy to * [[computer security]]3 KB (380 words) - 05:48, 8 April 2024
- ...s and practices, serving as a national resource in software engineering, [[computer security]], and [[process improvement]]. The SEI works closely with defense and gove690 bytes (91 words) - 18:17, 14 November 2007
- ...s offer [[online service]]s free of charge. However, people who want to [[computer security|exploit]] those services will often attempt to write a computer program tha3 KB (388 words) - 20:29, 22 March 2011
- '''Eldon Spickerhoff''' is a [[Canadian people|Canadian]] [[computer security]] expert.<ref name=cbc2018-10-04/>5 KB (583 words) - 20:43, 19 May 2022
- ...Amendment, which has been vital for hackers and those with an interest in computer security ([[Dan Bernstein]], [[2600 Magazine]] and [[DeCSS]]).2 KB (353 words) - 12:47, 22 March 2009
- detail. (A former official at NSA's National Computer Security Center told7 KB (1,186 words) - 14:20, 8 March 2024
- [[Runa Sandvik]] and [[Michael Auger]], computer security experts, spent some time with one of these rifles, and found it was relativ6 KB (769 words) - 21:56, 25 August 2022
- The media have generally painted hackers as [[computer security]] criminals. Some proponents of the original meaning of the term "hacker" (6 KB (943 words) - 05:48, 8 April 2024
- detail. (A former official at NSA's National Computer Security Center told8 KB (1,338 words) - 05:49, 8 April 2024
- ...ffer, overwriting other data. This error is the most commonly exploited [[Computer security]] flaw, and its prevalence is due to the common use of languages such as [[ ...stion. This simple concept has had profound implications in the annals of computer security.9 KB (1,329 words) - 05:48, 8 April 2024
- ...ough programmer errors, these topics have gained in importance in studying computer security issues.8 KB (1,334 words) - 18:04, 20 March 2009
- Many attacks on computer security try to get the computer to do something for the [[miscreant]], perhaps give6 KB (1,051 words) - 05:48, 8 April 2024
- Guidance for implementing FISMA comes from the Computer Security Resource Center, Computer Systems Division, National Institute of Standards | publisher = Computer Security Resource Center, Computer Systems Division, National Institute of Standards20 KB (2,779 words) - 13:29, 20 March 2023
- ...rk units into the final result. Additionally, to prevent result forging [[computer security|attacks]] the master must attempt to identify incorrect results and reduce11 KB (1,565 words) - 15:12, 10 June 2010
- This sort of attack raises the stakes; it is not just a general threat to computer security, but a very specific threat to high-value secrets. The effort involved gene12 KB (1,977 words) - 08:55, 22 April 2024
- ...hy has become a widely used tool in communications, computer networks, and computer security generally. The security of many modern cryptographic techniques is based on9 KB (1,312 words) - 05:49, 8 April 2024
- ...essential part of [[communications intelligence]] and of some attacks on [[computer security]]. Often, the attacker's goal is to read material which the cryptosystem's For further discussion, see [[computer security]].32 KB (4,913 words) - 14:38, 18 March 2024
- ...essential part of [[communications intelligence]] and of some attacks on [[computer security]]. Often, the attacker's goal is to read material which the cryptosystem's For further discussion, see [[computer security]].32 KB (4,916 words) - 05:49, 8 April 2024
- | last = National Computer Security Center36 KB (5,247 words) - 21:34, 26 May 2024
- ...erally both more security-conscious than end users and more able to follow computer security procedures. If not, at least there are fewer of them to educate or replace.40 KB (6,219 words) - 05:49, 8 April 2024
- ...that grew out of it. ... Seemingly every major figure in cryptography and computer security has passed through the list from time to time.<ref>{{citation35 KB (5,430 words) - 07:27, 18 March 2024
- ...ranch of information operations, which includes technical measures such as computer security and attacking hostile computers, but also "soft" disciplines such as psycho30 KB (4,571 words) - 06:56, 4 April 2024