Property | Value |
rdfs:label | |
is dcterms:subject of | - OS X
- Phonetic search engine
- File-sharing
- Wallpaper
- Assertion
- Operation Buccaneer
- Downloader
- Signature scanning and algorithmic detection
- Instruction
- Software engineer
- Acquiring and Enforcing the Government's Rights in Technical Data and Computer Software Under Department of Defense Contracts
- Spyware
- Routine
- Computer Software Copyright Act of 1980
- Software agent
- Antispyware software
- Verification
- Pseudoflaw
- Cincom Systems v. Novelis
- Apple App store
- Internet Filtering
- Static analysis
- OS kernel
- Advertising display software
- NSF Middleware Initiative and Integration Testbed
- Botnet code
- Insight Toolkit
- Creative Commons Australia
- Open Pretty Good Privacy
- Software piracy
- Tracking software
- Search engine unifier
- Hypervisor
- Compiled virus
- Peer-to-peer software
- Communications software
- Glitch
- Undocumented feature
- Cloud computing provider
- Network Intrusion Detection System
- Medical Information Bus
- Business process controls
- Cryptor
- Software conversion
- Online wallet
- NATO open systems environment
- Bridge
- Biometric service provider
- Stability
- Computing infrastructure
- ILoveYou
- Really Simple Syndication
- Newsreader
- Document Review, Edit, Sign
- Software-as-a-Service
- Telecommunications software
- Hardening
- Guardian Project
- Quality assurance
- Hackathon
- Object Linking and Embedding
- Internet infrastructure
- Authoring tools
- Program library
- Open Source
- End User License Agreement
- Mac OS
- Security Development Lifecycle
- Critical Code: Software Producibility for Defense
- Gizmo
- Hidden code
- GNU
- Melissa virus
- Cross-site scripting
- Operation Digital Piratez
- Corrective maintenance
- Audio data compression
- Unbundling
- Structured Query Language
- Web service
- App Quality Alliance
- Agile software development
- Intrusion detection system
- Direct3D
- Service‐oriented architecture
- .NET
- Pseudo-flaw
- Critical update
- Sensitive application
- Software Industry
- Structured programming
- Defense automated warning system
- Assembler
- E-mail application
- S.O.S. v. Payday
- Export controls
- Hypervisor attack
- Automated Export System
- Thrushcode v. W.W. Computing
- Systemation v. London Computer Centre
- Wiki
- Computer Software Configuration Item
- DOE Order 1330.1D
- Edutainment
- Legacy System
- Upgrade
- Junger v. Daley
- FastTrack protocol
- Automated assets
- List processing
- Web Content Management System
- Finding a Balance: Computer Software, Intellectual Property, and the Challenge of Technological Change
- Threat Landscape and Good Practice Guide for Software Defined Networks/5G
- Compiler
- Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software
- Trial Version
- Scalability
- Software design
- Desktop application
- Bangladesh Computer Samity
- Understanding Anti-Virus Software
- First generation language
- Licensee
- Precompiler
- Virtual currency
- FloodNet
- Auditor
- Try-and-buy license
- Magic Lantern
- Licensor
- Anti-Aliasing
- Stovepipe application
- C
- Fedora
- Concurrent use license
- Add-in
- Shell
- Systems software
- Whelan v. Jaslow
- Open platform
- RSS reader
- Port
- Social software
- Hot fix
- Assured software
- Streaming media player
- Draft Software Policy
- Security Tool
- ITunes Jukebox
- Load testing
- RFID application
- Keyloggers
- Spamware
- Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff
- Application software
- Special Publications: Generalized Computer Programs - Are They Worth the Effort?
- Application hosting service
- Hidden dialer
- Laboratory information system
- Learnability
- Debug
- Share-folder feature
- Workflow software
- Issue tracking system
- Installability
- Decompilation
- Correctness
- Authoring software
- Cybertek Computer Products, Inc. v. Whitfield
- Bot program
- Real-time system
- Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DOD Software
- Security by design
- Government-off-the-shelf
- App
- Secure And Fast Encryption Routine
- Enterprise resource planning system
- Computer resources integrated support document
- Internet Explorer
- Scareware
- Defense Federal Acquisition Regulation Supplement
- Antivirus software
- Apple v. Psystar
- Software compatibility
- Operating environment
- Password Guessing
- Predictive text
- Worm
- Software Publishers Association
- Utility program
- Computer simulation
- Web client
- Zero-day exploit
- National Information Assurance Partnership
- Scores virus
- Gateway
- Enterprise application software
- Bit rot
- System modifying software
- The App Economy
- Resolver
- Total Cost of Ownership
- Electronic agent
- Information Technology Markup Language
- Application Developers Alliance
- Shrinkwrap license
- Software interface
- Cloud operating system
- Sendmail
- Laws of Software
- Love Bug virus
- Insight Smart Discovery
- Automotive Cybersecurity Best Practices
- Time behavior
- Microprogram
- Productivity software
- Screen scraper
- BREIN
- Reminder - Ensuring Competition When Acquiring Information Technology and Using Common Security Configurations
- Asembling
- Release early and often
- Knowbot
- Spellchecker
- Drive-by installation
- Conficker
- Interpreted virus
- Source
- Shared source license
- Benign bot
- Technology Transfer: Copyright Law Constrains Commercialization of Some Federal Software
- Minor application
- Source code editor
- Software client
- Proxy agent
- Workstation
- Software Update
- Customer Account Data Engine 2
- EXtensible Access Control Markup Language
- Coalition of Automated Legal Applications
- Mobile application gateway
- Best Practices for Negotiating Cloud-Based Software Contracts
- Basic
- Pseudocode
- Google Docs
- Lossless compression
- Software domain
- Crimeware
- Government Open Systems Interconnection Profile
- Open security
- Diagnostic software
- Lynx
- Functional testing
- Microcode
- Closed shop
- Business data processing
- Interactive animation
- Configuration error attack
- Application obfuscation
- Infected system
- Packaged software
- Lotus Development v. Borland International
- Intelligence and Information Fusion
- Autoskill v. National Educational Support Systems
- Duping
- LAN
- American Bar Association Working Group Report on the Uniform Computer Information Transactions Act ("UCITA")
- DOE Order 200.1
- Beta version
- Back Door
- Fault tolerance
- LoveLetter worm
- System software
- Enterprise system
- Computer Systems: VA's Target Project Never Achieved Redesign of Its Processing Software
- Information Systems Security Products and Services Catalogue
- Application Reference Model
- Autonomous agent
- Software Assurance Metrics and Tool Evaluation
- Program analyzer
- Flooding program
- Windump
- Micro Data Base Systems v. Dharma Systems
- 321 Studios v. MGM Studios
- Phishing kit
- Mobile Offender Recognition and Identification System
- Ghostware
- Shopping agent
- Botnets as a Vehicle for Online Crime
- Guest OS
- Patch management
- Berkeley Software Distribution
- Decision table
- Tavory v. NTP
- Remote
- Programmable automation
- Inventory control system
- Loop-back mode
- Second generation language
- Understandability
- Certification authority software
- Veterans: The Veteran Administration's Efforts To Consolidate Computer Programming Resources at a Single Location
- Cyber Security Evaluation Tool
- Application tool
- AllJoyn
- Safe Mode
- SAS Institute v. S&H Computer Systems
- NIST Special Publication 800-28
- Business Software Association of Australia
- Session hijacking
- Desktop productivity tools software
- FDA Policy for the Regulation of Computer Products
- Creeper virus
- Delete
- Binary Code
- Testability
- Adobe v. Canus
- File system
- F-35 Joint Strike Fighter: Problems Completing Software Testing May Hinder Delivery of Expected Warfighting Capabilities
- Chernobyl virus
- Software platform
- Bug bounty
- Background process
- Translation
- Software Security Assurance
- National Counterterrorism Center Online
- Malware
- Update rollup
- Window manager
- Vector
- Trilog Associates v. Famularo
- Mobile browser
- Binder
- Port scanner
- Full-feature operating system
- Toolbar
- Central Point Software v. Global Software
- Software distributor
- Web access log
- In the Matter of DesignerWare
- Oracle America, Inc. v. Google
- Information Technology: Contracting for Computer Software Development - Serious Problems Require Management Attention To Avoid Wasting Additional Millions
- Netscape Navigator
- Embedded system
- Demon dialer
- Horizontal segment
- Software user
- Conformance
- SQL injection vulnerability
- Postprocessor
- Com-Share v. Computer Complex
- Herdict
- Disassembly
- Rootkit
- Utility
- Shell program
- Adobe Shockwave
- COTS software
- Virus obfuscation techniques
- Self-replication
- Version control system
- European Strategic Program on Research in Information Technology
- Clean install
- Email redirector
- Mnemonic
- Server application
- Access control software
- Microinstruction
- Trap Door
- Replaceability
- Perl
- Software vendor
- Create, Read, Update, Delete
- Syntax
- Software as a trade secret
- Search agent
- Server
- Tor
- Benchmark test
- Custom-developed code
- TinyOS
- Cloud Computing Center for Mobile Application
- Ad blocker
- Chat
- Adaptation
- Application Front End
- Interactive software
- Ripping
- Publicly available technology and software
- Application protocol
- Server Virtualization
- Widget
- NISTIR 8151
- Executive Order 13103
- Attack pattern
- Software verification
- Spreadsheet
- Jailbreaking
- Vaporware
- Enterprise resource planning
- Knowledge base
- Icon
- Application file
- Sandbox escape
- Modularity
- Guidance to Industry: Cybersecurity for Networked Medical Devices Containing Off-the-Shelf (OTS) Software
- National Defense: Better Software Planning Needed at the Air Force's Global Weather Central
- Clarifying Guidance Regarding Open Source Software (OSS)
- ENCOMPASS
- Bookmark method
- Malicious code
- Accurateness
- VBScript
- App economy
- In re Select-a-Seat
- Software Defined Perimeter
- Compatibility
- Revision control
- Factual Analysis Criminal Threat Solution
- Network scanner
- Structural Dynamics Research v. Engineering Mechanics Research
- Aggregator
- Contextual menu
- Application Back End
- Observations on Software Centers
- Site license
- Automated information system application
- Portfolio
- Arbitrary code execution
- Decompiler
- Heap
- In re Aimster Copyright Litigation
- Host-based firewall
- Microsoft Windows registry
- Inference engine
- Group chat
- Open Source Responsible Disclosure Framework
- Software license
- Wachter Management v. Dexter & Chaney
- Attack surface
- Demon program
- ADAPSO
- Wireless Markup Language
- Clandestine code
- Windowing system
- NIST Special Publication 800-40
- Improving COBOL Applications Can Recover Significant Computer Resources
- Filter
- Mydoom
- Mobile Health Apps Interactive Tool
- OMB Memorandum M-04-16
- IT software
- Green Dam
- Softswitch
- Blue-hat hacker
- Endorsed Cryptographic Products List
- Keyword filter
- Representational state transfer
- Project Management Life Cycle
- Humanware
- Bug report
- Programmer
- European Information Network
- Binary executable file
- Preserving.exe: Toward a National Strategy for Software Preservation
- Apple Computer v. Computer Edge
- New Zealand Software Association
- Wall Data v. L.A. County Sheriff's Department
- E.F. Johnson v. Uniden
- Application security testing
- Federal Information Exchange, Inc.
- Inspection
- List server
- Utilities
- Hack
- Macro language
- Freely redistributable software
- Application
- Parallel development
- Guidance for the Content of Premarket Submissions for Software Contained in Medical Devices
- Kermit
- Ministry of Industry and Information Technology
- Programs
- CIH (Chernobyl) virus
- Appliance
- Modding
- Building Energy Analysis Computer Programs Developed by Federal Agencies - Cost, Use, and Need
- Build automation
- Business and Accounting Software Developers Association
- Closed source
- Translator
- Cross-site scripting flaws
- Malware scanner
- Save
- AutoComplete
- Source code escrow
- Berkeley Systems v. Delrina
- Argus
- Microsoft Security Response Center
- Closed source operating system
- Carnivore
- Homegrown software
- Softech Worldwide v. Internet Technology Broadcasting
- Modeling
- Federal Agencies' Maintenance of Computer Programs: Expensive and Undermanaged
- Analyzability
- Army Reprogramming Analysis Team
- RRX Industries v. Lab-Con
- The Internationalisation of Software and Computer Services
- Patch
- Credit card number generator
- Network operating system
- App Store
- Code.gov
- Enterprise software
- Safe search filter
- Altered
- Blacklisting software
- Hotfix
- Plug-in
- Harvester
- Dialer program
- Infect
- Software framework
- Software Design and Productivity
- Encase
- Windows XP
- Privileged instructions
- BSD license
- Software Capability Evaluation
- Virus checker
- Cleanroom
- Attack program
- Gates v. Swift
- DOE Guide 205.2-1
- Computer Forensics Tool Testing
- Software License Agreements: Ignore at Your Own Risk
- Screening software
- Version number
- Security update
- Integrated Collaborative Environment
- DevOps
- Software publishing industry
- Geographic Resources Analysis and Support System
- NPC
- Lisp
- Beta culture
- Micro-Sparc v. Amtype
- 128-bit encryption
- Unit Testing
- Server program
- Intellectual Property Issues in Software
- Web developer
- Public health processor
- Fingerd
- Resource Abstraction and Control Layer
- Thread
- Trusted software
- Location-based application
- Automated decision making application
- Add-on
- Local delivery agent
- Importing
- Defense Science Board Task Force on Mission Impact of Foreign Influence on DOD Software
- Localization
- Automated controls
- Cage
- EXecute In Place
- Softman v. Adobe
- Immortal
- Groupware
- Applet
- Anti-virus management
- Computer software documentation
- Stealthing
- United States v. Slater
- Web application
- Software-intensive system
- Terminal emulator
- Uninstall
- Near field communication enabled smartcard
- COBOL
- History sniffing
- Open Government Data Initiative
- Hardware driver
- Custom software
- XML
- In re Pardo
- Security software
- Feature bloat
- Authoring
- Programming
- Support
- Benchmark
- MGM v. Grokster
- Wirth's Law
- Collaboration application
- Pre‐programmed
- License
- Image manipulation
- Earth System Modeling Framework
- Weakness
- Software bundler
- Migration
- Google Apps
- Best Practices for Mobile Applications Developers
- Bootkit
- Functional requirements
- Enterprise Software Initiative
- Joke Program
- Videogame
- Morris worm
- End-user piracy
- Variable
- Open shop
- The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability
- Data-level parallelism
- Personal Computer/Smart Card (PC/SC) Workgroup Open Specifications
- Lockout
- Application system owner
- Netbula v. Bindview Development
- Database program
- Web app attack
- Storage Technology v. Custom Hardware
- Alteration
- Disk operating system
- Software Used in Medical Devices Needs Better Controls To Avoid Compromising Patient Safety
- Interpreter
- Fuzzer
- Rogueware
- Ajax
- Optimization
- User Interface
- Flight Simulator
- Creative Commons New Zealand
- Resource monitoring
- DCSNet
- Web Hypertext Application Technology Working Group
- User-accessible programmability
- Short Form Notice Code of Conduct To Promote Transparency In Mobile App Practices
- IM/IT Policy for Fielding of Commercial Off the Shelf Software
- Atom Syndication Format
- OpenNebula
- NITRD Subcommittee
- Microsoft v. Harmony Computers
- E-mail service
- Neural network
- Peckham Materials v. Raima
- Digital Weather Markup Language
- Suitability
- Coder
- Daemon
- System monitor
- Content access log
- Parental control software
- Supervisory Control
- Apple v. Microsoft
- Command language
- Data and Analysis Center for Software
- Coerced-sharing feature
- Application virtualization
- Computer Security: Virus Highlights Need for Improved Internet Management
- Reference architecture
- Freeware
- Mail user agent
- Cloud delivery model
- Multitenancy
- Flash
- Proxy Attack
- Electronic program guide
- Look and feel
- Instant messaging redirector
- Software suite
- DON Open Source Software Guidance
- Enterprise Software Category Team
- Alpha version
- Government-furnished software
- SDI: Technology, Survivability, and Software
- FISM 12-01
- General Public License
- Code injection
- Parasite
- Information Technology: Acquisition and Use of Software Products for Automatic Data Processing Systems in the Federal Government
- Rogue program
- Emulator
- Free software movement
- Kernel
- Free software
- Software modification
- Bitmessage
- Gopher
- President’s Commission on the Patent System
- Change control procedure
- Computer software
- Software Configuration Item
- Solution stack
- Internationalization
- Anomaly
- Data flow analysis
- Search engine
- Design phase
- Update
- Bug
- Software Development Life Cycle
- Host operating system
- Hijacker
- O’Connor v. Commonwealth of Virginia
- Christmas Tree virus
- DirectX
- Year 2000 Computing Crisis: A Testing Guide
- Computer Associates v. Altai
- Computer-aided software engineering
- Pay-per-install
- Programmed
- Software correctness testing
- Addamax v. Open Software Foundation
- Safari
- Exploit kit
- Concurrent processes
- Native instructions
- Object-oriented programming
- Passport Information Electronic Records System
- Resource behavior
- Remote administration tool
- Software support
- Flaw
- Software protection
- Computer Maintenance Management System
- Full Release
- Programming model
- Fork bomb
- Software validation
- Software life cycle
- Retail piracy
- Automated Security Self-Evaluation Tool
- Office of Software Development
- Duqu
- OMB Memorandum M-03-14
- Application owner
- Notice of Non-Compliance with California Online Privacy Protection Act
- Android
- Integration testing
- Microsoft
- Screen scraping
- Exploit code
- Blended attack
- Biometric engine
- Public domain software
- Spambot
- Mobile application management
- Testware
- Algebraic language
- Beta Testing
- Limited-feature operating system
- Financial Management Systems Software
- Software crash
- Implications of Recent Web Technologies for NARA Web Guidance
- Adaptive maintenance
- Bootstrap
- Program
- O'Connor v. Commonwealth
- Crypter
- Rogue security software
- Computer-Aided Engineering
- Information security controls
- Google Reader
- Tablet device
- Security hole
- Kepner-Tregoe v. Vroom
- Vivo
- Palm OS
- Decompile
- 911 system
- Platform
- Analytics engine
- Application content filtering
- Committee for Advancing Software-Intensive Systems Producibility
- Brain
- Finger
- Apache 2.0
- Fourth generation language
- System modification software
- Semantic model
- Google Search
- Prototyping
- Security Token
- Bundling
- Labrador Software v. Lycos
- Platform-independent
- Host intrusion prevention
- Scanner
- Extension
- Software publisher
- Diamond v. Diehr
- Media Player
- Web-based
- Anti-malware software
- Acrobat
- Multitasking
- Constructor
- The Link between Pirated Software and Cybersecurity Breaches How Malware in Pirated Software Is Costing the World Billions
- Ushahidi
- Managing Weapon System Software: Progress and Problems
- Database
- Configuration management
- Biometric-based authentication application
- WinZip
- Change Control Board
- WANK/OILZ worm
- Media server
- OMB Memorandum M-07-11
- Computer Software and Intellectual Property
- Binary
- Recompile
- Spear Marketing v. BancorpSouth Bank
- Understanding Mobile Apps
- Computer process
- Information Security: Agencies Face Challenges in Implementing Effective Software Patch Management Processes
- Logical access
- Consumer Protection Against Spyware Act
- Virus writer
- Client appliance
- Open source license
- Named user license
- Computer Maintenance Competition Assurance Act of 1998
- Password cracking program
- Interoperability testing
- APL
- Internet of Things middleware
- Software asset management
- Software item
- Software architecture
- Lexis-Nexis
- Enforcement Automated Biometric Identification System
- Bagger
- Local area network
- Program description
- Programming Language
- Interface
- Stuxnet
- Cloud software
- Copyright Registration for Computer Programs
- Unix
- Interactive Digital Software Association
- Registrar administration tool
- Process for Requesting Waivers for Continued Use of Unsupported COTS Software
- Y2K problem
- Application generator
- Kazaa
- Cross-compiler
- Graphics software
- Bing
- Free/libre/open source software
- Install
- Lossy compression
- Koobface
- Human Authentication Application Program Interface
- Cybertek v. Whitfield
- Ripping software
- Bugbear
- NetBus
- Parameter List
- Malfunction
- Keyword search
- Peer-to-Peer File Sharing: A Guide for Business
- WordPerfect
- Application developer
- Middleware
- Enterprise software agreement
- Subscript
- Video game
- Running
- Microservices
- Uniform Computer Information Transactions Act
- DeCSS
- Text box
- Privacy policy generator
- NIST Special Publication 800-19
- Software vulnerability
- Infosystems Technology v. Logical Software
- Portability
- Server license
- Network-based intrusion prevention system
- DOE Order 1330.1C
- Rule of doubt
- Windows Registry
- Heartbleed
- Programmability
- Desktop software
- Flash cookie
- Machine language
- Enhancement
- Ad tags
- Authentication and authorization infrastructure
- ISO/IEC 19770
- Database management system
- Validation
- Window
- Zango v. Kaspersky Lab
- Nondependent instruction
- 1mage Software v. Reynolds & Reynolds
- Brown Bag v. Symantec
- Executable code
- Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain
- Trivial File Transfer Protocol
- Dump-restore program
- Word processor
- Data Theft
- Legal Protection of Software
- Unidirectional social media application
- Auxiliary material
- Security by default
- TWiki
- Instruction count
- Walled garden filter
- Mail transfer agent
- Program development process
- Internet Complaint Search and Investigation System
- Dialer
- Feature pack
- Tor browser
- Business application
- Untrusted
- Test environment
- Computer telephony integration
- Compile
- Downtime
- Free Software Foundation
- Concurrent user license
- FTC v. Enternet Media
- Source Code
- Graphics Device Interface
- Computer-aided system engineering
- Physical access control system
- Digital audio workstation
- White list
- Business process application controls
- NIST Special Publication 800-163
- Modular software
- Adoption of Recommendations in Report of Commission on New Technological Uses of Copyrighted Works
- Sustainable Computing Consortium
- MS-DOS
- Software Freedom Law Center
- Case sensitivity
- Beagle
- DOD Instruction 5000.5X
- Public key encryption
- League for Programming Freedom
- Integrated Development Environment
- Lehigh virus
- Full-text search
- Code refactor
- Building Security in Maturity Model
- Disassemble
- Virus
- Platform as a Service
- Scope creep
- Computer-generated work
- Software-defined radio
- Blue Screen of Death
- Vulnerability Identification Self-Assessment Tool
- Application system
- A Working Glossary of Computer Software Terms
- Helper application
- Autocorrect
- File association
- Product activation
- Virus Scanner
- Abandonware
- Encryption source code
- GoogleBot
- Advisory Commission on Patent Law Reform
- Talk
- Host-based intrusion prevention system
- Deleted file recovery
- Certificate of Authenticity
- Plains Cotton v. Goodpasture Computer
- Algol
- Perfective maintenance
- Business process application level
- High End Computing Infrastructure and Applications
- A Guide for Acquiring Commercial Software
- Jerusalem
- Computer language
- Software library
- Deposit of Computer Programs and Other Works Containing Trade Secrets - Notice of Inquiry
- Bulletproof
- Scripting Language
- NIST Special Publication 800-69
- Mobile app
- WordPress
- Spaghetti code
- Killer App
- Software Freedom Conservancy
- Vendor lock-in
- Conversion
- Conference on Data Systems Languages
- OMB Memorandum M-16-12
- Mail exploder
- Browser cache
- Maintenance
- Bytecode
- DivX
- Open Source Software Policy
- Clickwrap license
- Proof of correctness
- Memory corruption
- Bare metal virtualization
- Information Technology: Administration and Control of Procurement and Utilization of Automatic Data Processing
- End-to-end encryption
- Macro
- Command-line interpreter
- Security Awareness and Training
- Auto delete
- Shareware
- Windows Address Book
- Spyware file
- Remote code execution
- Mail merge
- Peerless Wall & Window Coverings v. Synchronics
- Implant
- Diigo
- Computer Software Rental Amendments Act of 1990
- EDonkey
- Screen reader
- Database Definition Language
- Data science application
- American Information Exchange
- Image enhancement
- High-interaction honeypot
- Microcomputer software
- Application Programming Interface
- Paperwork Reduction Reauthorization Act of 1986
- Automated communications management system
- Out-of-the-box solution
- Beta Site
- Software engineering
- App vetting process
- Mobile application store
- Software defect
- Spanish Association of Distributors and Publishers Entertainment Software
- Software Engineering Institute
- Text command
- Search-wizard feature
- Montgomery v. Noga
- Deadware
- Sasser
- Mobile operating system
- Trusted operating system
- Joint Deployable Intelligence Support System
- Low-level language
- E-mail bomb
- Vulnerability
- Spyware detection and removal utility
- Drive-by download
- Browser hijacking
- Client-based filter
- Distributed computing environment
- Independent software vendor
- End user license agreement
- Code Red worm
- Software & Information Industry Association
- Mobile medical app manufacturer
- Partitioning
- Third-party software
- Operability
- SubSeven
- Computer contaminant
- Computer Crime: Computer Security Techniques
- Dynamic analysis
- Pakistani Brain virus
- Data management system
- Host OS
- Backend-as-a-Service
- Multics
- Hazards United States
- Web Trojan
- Mobile Apps for Kids: Current Privacy Disclosures are Disappointing
- Language Translator
- Guest operating system
- Web Browser
- Behavior blocker
- Justice and Law Enforcement: Information Technology: Better Management Needed in Automating the Federal Judiciary
- Jughead
- ESRI
- Directive on the Legal Protection of Computer Programs (1991)
- High End Computing Research and Development
- Whitelisting software
- Association for Computing Machinery-Special Interest Group on Operating Systems
- Moscow
- Readme file
- Statement testing
- Tuning
- Enterprise resource management
- Federal Software Licenses: Better Management Needed to Achieve Significant Savings Government-Wide
- Anna Kournikova
- Mobile medical app
- Installation wizard
- Program file
- Agent
- Crimeware code
- Veronica
- Content generator
- BitTorrent client
- Content API
- Open Source Procurement Toolkit
- Incompatible
- Best Practices for Mobile Application Developers
- Information Service Industry Association of the R.O.C.
- Subroutine
- Adobe Systems v. Brenengen d/b/a/ Software Exchange
- DSpace
- Runtime library
- Parameter
- E-mail program
- Software maintainability
- HyperQuest v. N’Site Solutions
- Encryption product
- PL/1
- Multithreading
- Department of the Navy Application and Database Management System
- Browse
- Platform IT
- Stored program controlled
- Patents, Research and Technology
- Application service provider
- Remote control software
- Report on Computer Software Rental Act
- Reinstall
- Performance Monitor
- Application firewall
- Favorite
- Spam filter
- Conditional statement
- High level language
- Human Resource Management Information System
- Crash
- Foursquare
- CERNET
- National Centers for Biomedical Computing
- Licensed software
- Service-oriented architecture
- Fault injection testing
- Warez
- Systems testing
- Software wrapper
- OpenStack
- Software-of-unknown-pedigree
- Cross-site scripting vulnerability
- Mobile platform
- Server software
- Lotus Development v. Paperback Software
- Maturity
- Biometric software
- Data Cash Systems v. JS&A Group
- Dead
- Anti-virus tool
- Virtual World
- Standard Definitions: Missing and Needed Software Tools
- Mobile Apps for Kids: Disclosures Still Not Making the Grade
- Bring Your Own Cloud
- Software development
- Changeability
- Software Assurance Forum
- Boot block
- Artificial life
- Department of Defense Intelligence Information System
- Instruction-level parallelism
- Software Entitlement Working Group
- Stration
- System architecture
- Slammer worm
- Remote penetration attack
- CM Program Library
- Implementation phase
- Address book
- Mobile agent
- Memory Leak
- System developer
- Driver
- Cloud application
- Asynchronous Communications Device Interface
- Directive on the Legal Protection of Computer Programs (2009)
- Loan Monitoring System: SBA Needs to Evaluate Use of Software
- Operating system virtualization
- State v. Perry
- Disassembler
- Software Development Kit
- Directive on the Legal Protection of Computer Programs
- Monitor
- E-mail generator
- Comment
- DIMOC
- Password cracker
- Software robot
- National Association of Software and Service Companies
- Software versioning
- Sniffer
- Open Source Software (OSS) in the Department of Defense (DoD)
- Software reuse
- Heidtman Steel Products v. Compuware
- DoD Open Source Software (OSS) FAQ
- Functional unit
- App security requirement
- Battlefield Exploitation and Target Acquisition
- Script
- Software Defined Network
- Bug fix
- Master Program
- Execute
- Witty worm
- Hostname lookup attack
- European Computer Program Institute
- Meter Data Analysis System
- Milestone
- Application level general controls
- Google Play
- BackOrifice
- QuickTime
- RealNetworks
- Generic Interface Definition
- Network service worm
- Windows
- Card operating system
- Software-Enabled Consumer Products
- Java compiler
- Third generation language
- LINUX
- Fifth generation language
- Micro browser
- NIST Special Publication 800-147
- Modified off-the-shelf software
- The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond
- Clean system
- Firefox
- Backup software
- 17 U.S.C. § 117
- Key logger
- Local
- Redistribution feature
- Application programmer
- Application internal controls
- Zero Days, Thousands of Nights
- Client software
- FTP client
- Security Administrator Tool for Analyzing Networks
- Archie
- Spagetti code
- Front End
- Information Innovation Office
- Distribution management system
- Roeslin v. District of Columbia
- Google Earth
- Command processor
- Certification
- Information Technology: The Bureau of the Census Must Solve ADP Acquisition and Security Problems
- Software package
- Computer forensics tool
- Mass-market software
- Software testing
- UUCP
- Ground control station
- Trojan Horse
- Geography Markup Language
- Software
- Partial-uninstall feature
- Service Pack
- Firewall
- Software management
- Apple v. Formula
- Reliability
- PTO Guidelines: Computer Programs and Mathematical Algorithms
- Information assurance vulnerability alert
- Free/open source software
- CP/M
- Expert system
- OS/2
- Essential step defense
- Text editor
- Attacker tools
- Software Productivity, Sustainability, and Quality Interagency Working Group
- Pre-installed software
- Browser history
- Smartbuy
- Zero-day vulnerability
- Research Development Test & Evaluation
- Interoperability
- Security Event Management Software
- Invisible Internet Project
- Proprietary software model
- Digital Crimes Unit
- Programming tool
- Remote access tool
- Heuristic filter
- Jacobsen v. Katzer
- Xvid
- Controlled Access Protection
- Computer Virus
- Screensaver
- Adaptability
- Proprietary viewer
- Best Practice Guidelines for Producing High Quality Mobile Applications
- Alive
- Fortran
- Integrity flaw
- Open Software Foundation
- Abend
- Keystroke loggers
- News server
- Machinima
- Security Assertion Markup Language
- Filtering software
- Button
- Code
- Remote administration tools
- Configuration file
- Virtualized system
- Traceability matrix
- Launch
- Bootloader
- Cámara de Empresas de Software y Servicios Informáticos
- Point-and-click
- SNGMSG
- Vulnerability scanner
- GNU Free Documentation License
- Software Assurance
- Easter Egg
- Mobile App Developers: Start with Security
- Business process application
- Web Application Privacy Best Practices
- ’Repository Development Center
- C++
- Module
- Extensible HyperText Markup Language
- Linux
- BIOS
- Iterative software development
- Google Maps
- Software reliability
- Maintenance hook
- Rule
- Capability Maturity Model Integration
- Information Management: A List of Selected GAO Publications Containing Checklists or Guidance on Computer Software Topics
- INDICATE
- Infection
- Application platform as a service
- Automatic download software
- Finger demon
- Virtualization software
- Java
- Understanding Hidden Threats: Corrupted Software Files
- Advanced Encryption Standard
- Arithmetic operator
- Instruction set
- Logic Bomb
- Software monitor
- Preventive mechanism
- Computer program
- Hacker tool
- Personal Firewall
- Estimated source lines of code
- Information Security: Continued Action Needed to Improve Software Patch Management Processes
- User code
- Native app
- Shopping Cart
- Software Assurance Forum for Excellence in Code
- PowerPoint
- Hosted virtualization
- Attacker toolkit
- CONTU Final Report
- Password stealer
- Data General v. Grumman Systems Support
- IOS
- Dictionary attack
- Line of code
- Encryption
- Information Technology: A Selected Bibliography on Computer Software Conversion
- Monoculture
- Scheduling software
- Netsky
- Tracking app
- Bespoke solution
- Unlimited rights
- High Confidence Software & Systems Interagency Working Group
- Anonymous-entity resolution
- Anti-spyware
- Ada
- Application program interface
- Droneware
- Gamma Testing
- Cell
- Cascade
- Application streaming
- Open Source and Open Standards
- About box
- Buried code
- Software token
- Fraudware
- Sandbox
- Common Gateway Interface
- Encryption software
- Apache
- Content-control software
- ISO 90003
- Computer-aided manufacturing
- Web browser plug-in
- Information Technology Policy Letter
- Coding
- Translation software
- Code and Other Laws of Cyberspace
- Multi-hop problem
- Backup Copy
- CrossPlatform
- Computer programming
- Mobile App Advertising Guidelines
- Proprietary operating system vendor
- Software security
- Encryption object code
- Trickler
- Local penetration attack
- Mail client application
- Compatible Time-Sharing System
- Time bomb
- Complaint Management System
- ActiveX
- COCOMO
- Automated Systems v. SBC
- Packer
- Language
- Access software
- Back end
- In re Meyer
- Bot
- War dialing
- Database application
- Cyber weapon
- U.S. v. Microsoft
- Mass mailing worm
- Internet Software Consortium
- Commercial software
- Napsco International v. Tymshare
- SGML
- Association for Competitive Technology
- Fingerprint filter
- Website capture tool
- PC-DOS
- MAI v. Peak
- Interactive Software Federation of Europe
- Software Development Plan
- Gottschalk v. Benson
- Shellcode
- Closed architecture
- Software escrow
- Screenlogger
- Pretty Good Privacy
- DHS IT system
- Personal information management application
- Open Networking Foundation
- Content filter
- Federal Software Exchange Center
- Opcode
- Settings modifier
- Association of Shareware Professionals
- Data grabber
- Computer Software Unit
- Enterprise Software Architecture
- Executable file
- Local denial-of-service attack
- Application proxy
- Assembly language
- Crackz
- Java virtual machines
- Synercom v. University Computing
- Developer
- Modification
- System programmer
- Open source software
- Proxy
- Triad v. Southeastern Express
- Auto-responder
- Secure microcontroller chip
- DOS batch file
- Blog client
- Dynamic Hypertext Markup Language
- Digital fingerprint
- Security analysis software
- CONTU Commission
- Code churn
- Firmware-over-the-air
- Nmap
- A Guide for Acquiring Software Development Services
- IPost
- Cross-assembler
- Programmable
- Software test report
- Fuzz testing
- Software patentability
- Canary
- Bernstein v. Dept. of Justice
- Dialing software
- Computer-Assisted Drafting and Design
- Configuration management controls
- Software Licenses: DOD's Plan to Collect Inventory Data Meets Statutory Requirements
- BitTorrent
- System scanner
- Artificially-intelligent attorney
- Anonymiser
- NIST Special Publication 800-6
- Bloglines
- Malicious payload
- Warez group
- MegaD
- Host Intrusion Detection System
- GUI
- Computer Based Assessment Tool
- Software proxy agent
- CGI scanner
- Privacy on the Go: Recommendations for the Mobile Ecosystem
- Microsoft Word
- E-mail client
- Mobile publisher
- Hadoop
- Legacy software program
- Speaker identity verification
- Web filter
- Software-closed architecture
- GPL license
- Firmware
- JavaScript
- Data cleansing
- NIST Special Publication 800-49
- Cookie
- Widget toolkit
- Operating system software
- Object code
- Initializing
- Transaction generator
- Analyzer
- Program statement
- Provisional Checklist for Software Conversion Projects
- Defect
- Government Operations: Proposed Revisions to Procurement Regulations Covering ADP Equipment and Services
- Windows CE
- Extensible markup language
- Pop-up blocker
- Marketing Your Mobile App: Get it Right From the Start
- Reprogram
- Remote login program
- Apple v. Franklin
- Krause v. Titleserv
- Business Software Alliance
- Speakeasy
- Operation Bandwidth
- Software failure
- Justice and Law Enforcement: Federal Agencies Could Save Time and Money With Better Computer Software Alternatives
- Embedded software
- Anti-virus
- HTML
- Software configuration management
- Application metering
- Wizard
- Tools-as-a-Service
- Vaccine
- Mobile software agent
- Machine instruction
- Antivirus tool
- Cookie buster
- Web tool
- Deliverable software
- Application server
- Base information infrastructure
- Computer software component
- Intermediate copying
- Windows Media Player
- Cable/Home Communication v. Network Productions
- File Manager
- Command
- Password sniffer
- Freely redistributable
- Mobile code
- Mosaic
- Data Manipulation Language
- Testbed
- PKI software
- Program optimizer
- Java class libraries
- Alpha testing
- Information Assurance Vulnerability Management
- DO-178B
- Open security environment
- E-mail archiving
- Application access
- Blogware
|