Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 20 of 25 results

IETF RFC 8058 - SIGNALING ONE-CLICK FUNCTIONALITY FOR LIST EMAIL HEADERS Organization: IETF
Date: 2017-01-01
Description: This document describes a method for signaling a one-click function for the List-Unsubscribe email header field. The need for this arises out of the actuality that mail software sometimes fetches URLs in mail header fields, and thereby accidentally triggers unsubscriptions in the case of the List-Unsubscribe header field.
AAMI 62304 - MEDICAL DEVICE SOFTWARE - SOFTWARE LIFE CYCLE PROCESSES - CONSOLIDATED TEXT A1: 2016 Organization: AAMI
Date: 2006-01-01
Description: This standard applies regardless of the method of delivery of the software (for example: transmission by network or email, optical disk, flash memory or EEPROM).
CEI - EN 62304/A1 - MEDICAL DEVICE SOFTWARE - SOFTWARE LIFE-CYCLE PROCESSES Organization: CEI
Date: 2016-04-01
Description: This standard applies regardless of the method of delivery of the software (for example: transmission by network or email, optical disk, flash memory or EEPROM).
CENELEC - EN 62304 - MEDICAL DEVICE SOFTWARE - SOFTWARE LIFE-CYCLE PROCESSES - INCORPORATING CORRIGENDUM NOVEMBER 2008; INCORPORATES AMENDMENT A1: 2015 Organization: CENELEC
Date: 2006-07-01
Description: This standard applies regardless of the method of delivery of the software (for example: transmission by network or email, opticlal disk, flash memory or EEPROM).
DS/CEN/TS 16080 - INTERNET CONTENT AND COMMUNICATIONS FILTERING SOFTWARE AND SERVICES Organization: DS
Date: 2013-11-22
Description: This Technical Specification does not cover the following technologies: f) any kind of email filtering, including: antispam filtering, antivirus analysis of emails and attachments, anthiphishing filtering; g) other Web filtering for the purpose of enterprise or adult Web usage, including: antivirus analysis of Web content, antiphishing filtering; h) the analysis and/or filtering of any other application traffic delivered over HTTP/HTTPS/FTP including for instanc ...
ITG - EMAIL SECURITY - EMAIL SECURITY - A POCKET GUIDE Organization: ITG
Date: 2010-11-30
Description: E-mail could become the means for criminals to install a virus or malicious software on your computer system and fraudsters will try to use e-mails to obtain sensitive information through phishing scams.
CSA N290.14 - QUALIFICATION OF DIGITAL HARDWARE AND SOFTWARE FOR USE IN INSTRUMENTATION AND CONTROL APPLICATIONS FOR NUCLEAR POWER PLANTS - SECOND EDITION Organization: CSA
Date: 2015-01-01
Description: ., business applications, desktop computers, email, business networks), analysis software (e.g., scientific, engineering, and safety analysis software), or passive devices (e.g., wires), unless they are part of a safety-related computing system.
IETF RFC 3834 - RECOMMENDATIONS FOR AUTOMATIC RESPONSES TO ELECTRONIC MAIL Organization: IETF
Date: 2004-08-01
Description: This memo makes recommendations for software that automatically responds to incoming electronic mail messages, including "out of the office" or "vacation" response generators, mail filtering software, email-based information services, and other automatic responders.
CRC - KE12604 - COMPUTER SECURITY LITERACY : STAYING SAFE IN A DIGITAL WORLD Organization: CRC
Date: 2016-04-19
Description: The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware.
CRC - KE14000 - ANONYMOUS COMMUNICATION NETWORKS : PROTECTING PRIVACY ON THE WEB Organization: CRC
Date: 2014-04-10
Description: Details helpful tips for optimizing onion routing Defines and classifies mixed networks Illustrates the application of a mixed network to e-voting with a case study Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing.
CRC - E82094 - MESHFREE METHODS : MOVING BEYOND THE FINITE ELEMENT METHOD, SECOND EDITION Organization: CRC
Date: 2009-10-06
Description: Liu, please go to the website: www.ase.uc.edu/~liugrAn access code is needed to use program – to receive it please email Dr. Liu directly at:liugr@ucmail.uc.edu Dr. Liu will reply to you directly with the code, and you can then proceed to use the software.
DSF/ISO/FDIS 16175-2.2 - INFORMATION AND DOCUMENTATION - PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS - PART 2: GUIDELINES AND FUNCTIONAL REQUIREMENTS FOR DIGITAL RECORDS MANAGEMENT SYSTEMS Organization: DS
Description: It does not seek to set requirements for records still in use and held within business systems. Digital objects created by email, word processing, spreadsheet and imaging applications (such as text documents, and still or moving images), where they are identified to be of business value, should be managed within digital records management systems which meet the functional requirements set out in this part.
ISO 16175-2 - INFORMATION AND DOCUMENTATION - PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS - PART 2: GUIDELINES AND FUNCTIONAL REQUIREMENTS FOR DIGITAL RECORDS MANAGEMENT SYSTEMS - FIRST EDITION Organization: ISO
Date: 2011-04-15
Description: It does not seek to set requirements for records still in use and held within business systems. Digital objects created by email, word processing, spreadsheet and imaging applications (such as text documents, and still or moving images), where they are identified to be of business value, should be managed within digital records management systems which meet the functional requirements set out in this part.
SNZ - SA/SNZ TR ISO 16175.2 - INFORMATION AND DOCUMENTATION - PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS PART 2: GUIDELINES AND FUNCTIONAL REQUIREMENTS FOR DIGITAL RECORDS MANAGEMENT SYSTEMS Organization: SNZ
Date: 2012-06-04
Description: It does not seek to set requirements for records still in use and held within business systems. Digital objects created by email, word processing, spreadsheet and imaging applications (such as text documents, and still or moving images), where they are identified to be of business value, should be managed within digital records management systems which meet the functional requirements set out in this part.
PACKT - CENTOS 7 SERVER DEPLOYMEN - CENTOS 7 SERVER DEPLOYMENT COOKBOOK Organization: PACKT
Date: 2016-10-06
Description: What You Will Learn • See how to deploy CentOS easily and painlessly, even in multi-server environments • Configure various methods of remote access to the server so you don’t always have to be in the data center • Make changes to the default configuration of many services to harden them and increase the security of the system • Learn to manage DNS, emails and web servers • Protect yourself from threats by monitoring and logging network intrusion and system intrusion attempts, rootkits, and viruses • Take advantage of today’s powerful hardware by running multiple systems using virtualization In Detail CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server.
ATIS 0100030 - MEAN TIME BETWEEN OUTAGES – A GENERALIZED METRIC FOR ASSESSING PRODUCTION FAILURE RATES IN TELECOMMUNICATIONS NETWORK ELEMENTS Organization: ATIS
Date: 2012-08-01
Description: To request the historical version of ATIS-0100030.2010, please return completed form to ATIS via email to < doccenter@atis.org > or via fax to 202-347-7125, Attn: Kerrianne Conn.
PACKT - INTERNET OF THINGS WITH E - INTERNET OF THINGS WITH ESP8266 Organization: PACKT
Date: 2016-07-29
Description: What You Will Learn • Control various devices from the cloud • Interact with web services, such as Twitter or Facebook • Make two ESP8266 boards communicate with each other via the cloud • Send notifications to users of the ESP8266, via email, text message, or push notifications • Build a physical device that indicates the current price of Bitcoin• Build a simple home automation system that can be controlled from the cloud • Create your own cloud platform to control ESP8266 devices In Detail The Internet of Things (IoT) is the network of objects such as physical things embedded with electronics, software, sensors, and connectivity, enabling data exchange.
DSF/ISO/DIS 16175-2 - INFORMATION AND DOCUMENTATION - PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS - PART 2: GUIDELINES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS Organization: DS
Description: It does not seek to set requirements for records still in use within business systems. Digital objects created by email, word processing, spreadsheet and imaging applications (such as text documents, and still and moving images), where they are identified to be of business value, should be managed within electronic records management systems that meet the functional requirements in this Module.
DS/ISO 16175-2 - INFORMATION AND DOCUMENTATION - PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS - PART 2: GUIDELINES AND FUNCTIONAL REQUIREMENTS FOR DIGITAL RECORDS MANAGEMENT SYSTEMS Organization: DS
Date: 2011-05-31
Description: It does not seek to set requirements for records still in use within business systems. Digital objects created by email, word processing, spreadsheet and imaging applications (such as text documents, and still and moving images), where they are identified to be of business value, should be managed within 5 International Council on Archives Electronic Records Management Systems electronic records management systems that meet the functional requirements in this Module.
DSF/ISO/DIS 16175-2.2 - INFORMATION AND DOCUMENTATION - PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS - PART 2: GUIDELINES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS Organization: DS
Description: It does not seek to set requirements for records still in use within business systems. Digital objects created by email, word processing, spreadsheet and imaging applications (such as text documents, and still and moving images), where they are identified to be of business value, should be managed within 5 International Council on Archives Electronic Records Management Systems electronic records management systems that meet the functional requirements in this Module.

1 - 20 of 25 results