Articles, Newsletters, Podcasts, and Video
Discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, prevent their undetected modification and establish their authenticity.
moreValue used to control cryptographic operations, such as decryption, encryption, signature generation or signature verification.
moreEndorsement of a single candidate or slate of candidates by more than one political party. The candidate or slate appears on the ballot representing each endorsing political party. Also referred to as cross-party endorsement.
moreBallot that has been processed and whose votes are included in the candidates and measures vote totals.
moreAction taken to eliminate the causes of an existing deficiency or other undesirable situation in order to prevent recurrence.
moreProcess of testing an implementation against the requirements specified in one or more standards. The outcomes of a conformance test are generally a pass or fail result, possibly including reports of problems encountered during the execution. Also known as certification testing.
moreAn element of configuration management, consisting of the recording and reporting of information needed to manage a configuration effectively. This includes a listing of the approved configuration identification, the status of proposed changes to the configuration, and the implementation status of approved changes.
moreDocument detailing the process for identifying, controlling and managing various released items (such as code, hardware and documentation).
moreDiscipline applying technical and administrative direction and surveillance to identify and document functional and physical characteristics of a configuration item, control changes to these characteristics, record and report change processing and implementation status, and verify compliance with specified requirements.
more