implementation information

implementation information
n.执行性信息

English-Chinese dictionary of mining (英汉矿业大词典). 2013.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Information Engineering — (IE) or Information Engineering Methodology (IEM) is an approach to designing and developing information systems. It has a somewhat chequered history that follows two very distinct threads. It is said to have originated in Australia between 1976… …   Wikipedia

  • Information forensics — is the science of investigation into systemic processes that produce information. Systemic processes utilize primarily computing and communication technologies to capture, treat, store and transmit data. Manual processes complement technology… …   Wikipedia

  • Information engineering — (IE) or information engineering methodology (IEM) in software engineering is an approach to designing and developing information systems. Contents 1 Overview 2 History 3 Information engineering topics …   Wikipedia

  • Information and Content Exchange — (ICE) is an XML based protocol used for content syndication via the Internet. By using XML both sender and receiver have an agreed upon language in which to communicate. The system uses a Client Server architecture.On October 27, 1998 the… …   Wikipedia

  • Information technology consulting — (also called IT consulting, Computer consultancy, Computing consultancy, technology consulting business and technology services or IT advisory) is a field that focuses on advising businesses on how best to use information technology to meet their …   Wikipedia

  • Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… …   Wikipedia

  • Information Card — Information Cards are personal digital identities that people can use online. Visually, each Information Card has a card shaped picture and a card name associated with it that enable people to organize their digital identities and to easily… …   Wikipedia

  • Information security professionalism — is the set of knowledge that people working in Information security and similar fields (Information Assurance and Computer security) should have and eventually demonstrate through certifications from well respected organizations. It also… …   Wikipedia

  • Information and Communication Technologies for Development — (ICT4D) is a general term referring to the application of Information and Communication Technologies (ICTs) within the field of socio economic development. ICTs can be applied either in the direct sense, where their use directly benefits the… …   Wikipedia

  • Information technology governance — Information Technology Governance, IT Governance or ICT (Information Communications Technology) Governance, is a subset discipline of Corporate Governance focused on information technology (IT) systems and their performance and risk management.… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”