Search results

Jump to navigation Jump to search

Page title matches

  • #REDIRECT [[Information management/Definition]]
    47 bytes (4 words) - 10:31, 2 February 2012
  • ..., [[integrity]] and [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend t
    319 bytes (41 words) - 08:45, 13 September 2009
  • A succession of incremental information distortions occurring as a result of [[herding (banking)|herding]] behaviou
    153 bytes (18 words) - 05:28, 17 March 2010
  • {{r|Information theory}} {{r|Noise (information theory)}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • ...y intelligence analysis management|analyzing (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be ...iscipline of counterintelligence focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.
    10 KB (1,349 words) - 17:08, 1 April 2024
  • 31 bytes (4 words) - 05:36, 15 March 2024
  • #REDIRECT [[Information management/Bibliography]]
    49 bytes (4 words) - 10:32, 2 February 2012
  • ...ministrative controls such as physical security and personnel [[classified information|security clearances]]
    234 bytes (24 words) - 14:55, 26 February 2010
  • ...r bureaucratic reasons, its foreign offices were designated as the '''U.S. Information Service (USIS)'''; these often included public libraries.
    1 KB (217 words) - 23:06, 21 January 2010
  • The situation in which relevant information is known to some parties to an agreement, but not to others.
    140 bytes (21 words) - 07:44, 27 March 2012
  • ...ility of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to trans
    273 bytes (34 words) - 08:55, 4 September 2009
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • 12 bytes (1 word) - 05:16, 18 December 2007
  • Technique and process of searching, retrieving, and interpreting information from large amounts of stored data.
    148 bytes (18 words) - 19:27, 7 September 2009
  • ...ciples to the acquisition, organization, control, dissemination and use of information relevant to the effective operation of organizations of all kinds.
    224 bytes (28 words) - 10:31, 2 February 2012
  • 12 bytes (1 word) - 20:57, 23 December 2007
  • ...resources, personnel, procedures and technologies that provide end-to-end information sharing among all elements of the U.S. Department of Defense, other U.S. go ...the "edge" of the GIG. These tactical networks, such as the Joint Tactical Information Distribution System, or ''ad hoc'' networks set up with radios in individua
    8 KB (1,196 words) - 16:22, 30 March 2024
  • The situation in which relevant information is known to some parties to an agreement, but not to others.
    140 bytes (21 words) - 07:29, 27 March 2012
  • 42 bytes (4 words) - 09:29, 27 May 2008
  • 202 bytes (30 words) - 12:09, 22 January 2009

Page text matches

  • ...on and dissemination of literature or information - the activity of making information available for public view.
    172 bytes (23 words) - 18:48, 11 August 2009
  • ...ly for transient information but sometimes for permanent or semi-permanent information such as "boot" data for initialization
    226 bytes (28 words) - 16:18, 18 March 2009
  • ==General information== ===Production information===
    1 KB (161 words) - 03:37, 4 April 2017
  • {{r|Information theory}} ===Information theory===
    761 bytes (97 words) - 18:05, 3 March 2010
  • ==Further information==
    432 bytes (63 words) - 15:24, 15 December 2013
  • ...pected of war crimes were not prosecuted in exchange for information, such information on the [[Soviet Union]]
    235 bytes (33 words) - 14:18, 14 September 2009
  • ...g aware of all relevant information in one's environment, prioritizing the information, and not being distracted by irrelevancies
    181 bytes (24 words) - 04:31, 2 February 2011
  • ...ica.org/public/breeds/oc/intro.php The International Cat Association breed information.] *[http://www.iams.com/pet-health/cat-breeds/ocicat IAMS Ocicat breed information]
    395 bytes (55 words) - 23:48, 7 December 2011
  • ...pueblo.gsa.gov] (the [[Federal citizen information center|Federal Citizen Information Center]])
    531 bytes (73 words) - 00:37, 14 September 2013
  • ==Official government information about amateur radio licensing and operating== ...rvices/index.htm?job=service_home&id=amateur FCC] Official U.S. government information about amateur radio, from the Federal Communications Commission, the offici
    1 KB (158 words) - 12:49, 11 October 2009
  • ...gy/BVHomePage.html The Big Picture Book of Viruses] - Pictures and general information on many viruses * [http://www.vbrc.org Detailed genomic and bioinformatic information about Category A, B, and C priority pathogens at NIH-funded database].
    823 bytes (115 words) - 02:48, 27 May 2008
  • ===For additional information===
    671 bytes (93 words) - 19:34, 27 June 2008
  • ...l Library of Information Science and Technology, an open access archive of Information Sciences materials ...vest.sir.arizona.edu DL-Harvest] DL-Harvest, an open access aggregator for Information Sciences
    1 KB (210 words) - 07:20, 12 February 2009
  • ...ated by computers or not. It complements computer security, which protects information in computers. Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC.
    650 bytes (95 words) - 16:22, 30 March 2024
  • ...isclosure, including means for protecting personal privacy and proprietary information." <ref>44 USC 3542</ref> ...ure of contents. In a military context, however, the very existence of the information, and of its transmission, must remain secret against the threats of [[traff
    725 bytes (96 words) - 13:27, 30 September 2009
  • {{r|Information security}} {{r|RADIUS (information security)}}
    558 bytes (60 words) - 10:08, 4 May 2022
  • ...ed States public information source, conducting what today is called the [[information operations#psychological operations|"white propaganda" aspect of psychologi
    273 bytes (33 words) - 16:21, 9 September 2008
  • Information on the International Mathematical Olympiad: Information on the mathematical Olympiad process in India:
    702 bytes (74 words) - 11:27, 25 April 2008
  • * [[Entropy (information theory)|Entropy]] In information theory
    110 bytes (11 words) - 06:57, 24 September 2013
  • ...ency''', is the basic information-free [[electromagnetic wave]] onto which information is [[modulation|modulated]].
    229 bytes (26 words) - 08:40, 11 December 2009
View ( | ) (20 | 50 | 100 | 250 | 500)