- Articles
87,725 results
-
Information Management: Use of Computerized Information for Local and National Health Care Planning Purposes
General Accounting Office, Information Management: Use of Computerized Information for Local and National Health Care Planning Purposes (Oct. 17, 1980) (full-text). A study was presented on the design and use of a computerized information -
Hierarchical network
A hierarchical network is the type of network topology in which a central "root" node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in -
NIST Special Publication 1800-34B
National Institute of Standards and Technology, NIST Special Publication 1800-34B: (Preliminary Draft) Validating the Integrity of Computing Devices (Aug. 31, 2021). (full-text). Organizations are increasingly at risk of cyber supply chain compromise, whether -
Trespass
"One is subject to liability to another for trespass, irrespective of whether he thereby causes harm to any legally protected interest of the other, if he intentionally -
Grey propaganda
Grey propaganda "is [p]ropaganda that does not specifically identify any source." -
Copyright and the Information Highway
Information Highway Advisory Council, Subcommittee on Copyright, Copyright and the Information Highway: Preliminary Report of the Copyright Subcommittee (Mar. 1995) (not available online). Copyright has typically been the preoccupation of creators and a select group -
CC0 1.0 Universal (CC0 1.0) Public Domain Dedication
This Creative Commons designation CC0 1.0 Universal (CC0 1.0) Public Domain Dedication indicates that the person who associated a work with this deed has dedicated the work to the public domain by waiving -
Online communication
Online communication refers to the ways in which individuals as well as computers can communicate with each other over a computer network, such as the Internet. These ways include: chat rooms e-mail filling out -
Internet of Services
Under the Internet of Services (IoS) everything that is needed to use software applications is available as a service on the Internet, including the software itself, the tools to develop the software, and the platform -
Zone of privacy
A zone of privacy is an area or aspect of life that is held to be protected from intrusion by a specific constitutional guarantee or is the object of an expectation of privacy. "Encryption and -
Context collapse
Context collapse is a concept used by those academics writing about the effects of social media. It refers to the infinite audiences possible online as opposed to the limited groups a person can normally interact -
Battlefield Information Collection and Exploitation System
The U.S. Battlefield Information Collection and Exploitation Systems (BICES or US BICES) is an Office of the Under Secretary of Defense for Intelligence (OUSD/I) system that provides U.S. forces, NATO forces and -
Regional standard
A regional standard is -
CUI Framework
CUI Framework is -
E-business infrastructure
The e-business infrastructure is "It includes hardware, software, telecommunication networks, support services, and human capital used in electronic business and commerce. Examples of e-business infrastructure are: Computers, routers, and other hardware, Satellite, wire -
Present value
Present value (PV) is the value today of a future payment, or stream of payments, discounted at some appropriate compound discount rate. For example, the present value of$100 to be received 10 years from now -
Data injection
Data injection (or data insertion) occurs when input fields are populated with control or command sequences embedded in various ways that are nevertheless accepted by the application, or possibly passed to the operating system, that -
Interface design document
An interface design document is a document that describes the architecture and design of interfaces between a system and its components. -
Analog cellular system
An analog cellular system refers to a first generation (1G) cellular network that transmits voice communication using a form of analog modulation. It consists of three elements: a mobile telephone, cell sites, and mobile switching -
Contract evaluation
Contract evaluation is the process of reviewing a contract provided by a potential contracting partner to determine whether the terms of the contract meet whatever criteria have been established and/or whether the terms of -
Commercial database
A commercial database is a database developed and maintained by a commercial entity that is generally made available to customers and potential customers. -
Application owner
An application owner is the individual or group with the responsibility to ensure that the program or programs, which make up the application, accomplish the specified objective or set of user requirements established for that -
Password stealer
A password stealer (PWS) is malware that is specifically used to transmit personal information, such as user names and passwords. A PWS often works in conjunction with a keylogger or other tracking software. Source[] Anti -
Aerial surveillance
Aerial surveillance is surveillance that is usually conducted by unmanned aerial vehicles or reconnaissance aircraft. Their roles are to collect IMINT, SIGINT and MASINT. -
Glossary of Counterinsurgency Terms
Central Intelligence Agency, Glossary of Counterinsurgency Terms (May 19, 1962) (full-text). The CIA Special Group (Counter-Insurgency) has agreed to this glossary of 18 key definitions in the field of counter-insurgency.
Related Community

Wookieepedia
movies
100K
Pages100K
Images1
Video
Wookieepedia is a wiki-based online encyclopedia that contains detailed information about the Star Wars universe, including movies, books, video games, characters, locations, technology, weapons, vehicles, and everything in between. Founded in 2005, Wookieepedia has over 175,000 articles, covering everything from the…