CxQL is a query language by Checkmarx used for querying analyzed source code for security vulnerabilities, best coding practices, or any other issue an auditor would like to investigate within a code.The CxQL is very much like a database querying language, and is an intuitive and...
</noinclude>CyaSSL (or yet another SSL) is a small, portable, embedded SSL programming library targeted for use by embedded systems developers. It is an open source, dual licensed implementation of SSL (SSL 3, TLS 1.0, 1.1, and TLS 1.2) built in the C language. Included are SSL c...
The word “cybercartography” is the combination of two terms: (1) “cyber” (derived from Kubernan - to govern in Greek) which, in contemporary usage, is related to cyberspace loosely associated with computer usage; and (2) “cartography” (derived ...
Cyberconfidence is a concept in the information security field that describes the ability of an organisation or individual to operate safely and effectively in today's online environment, or cyberspace. It allows an organisation to assess its status and performance as regards cyb...
Cybercorrection - the concept of analytical support for government and public institutions. Cybercorrection carried out by intelligent robotic systems. Cybercorrection problem is to achieve effective and humane use of material and human resources. Cybercorrection goal is to elimi...
“CYBERKILL” is a novel written by Frank F. Fiore. The novel is a government conspiracy thriller which explores the combination of an ethnic bioweapon embedded in nanotechnology particles dispersed worldwide. The weapon is taken over by an artificial intelligence agent...
Cyberpunk Educator is a 2003 documentary study of mainstream Cyberpunk films of the 1980s. It was created by independent director Andrew J. Holden.The film uses the structure of literary theorist Northrop Frye to describe the common, repeating stories in Western culture, and how ...
CyberSafe is a series of data-encryption software programs offering hidden files and folders encryption signing, open-source disk encryption, and public-key infrastructure encryption. It is offered in three formats: Top Secret, Disk Encryption, and Files Encryption. contain &ldqu...
:Since the advent of the Internet, the numbers of data networks, applications, home computers and mobile data-driven devices such as smartphones have increased exponentially. Likewise, the opportunities for all of these to be exploited by computer viruses, hackers, and various ot...
A Cybersecurity Strategy is a high level plan to achieve one or more goals under conditions of uncertainty in cybersecurity.<sub>In this historical account of how the Cybersecurity Strategy developed and now its adopted definition, this Strategy is described for purposes of docum...
:As part of a Cybersecurity Strategy, a high level plan, an instance of which is documented on :The collection of capability data and measurement is achieved using a strategy with a 5 layout plan. :A 'layout' being defined as the way in which the parts of something are arranged o...
Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations. The company uses machine learning and artificial intelligence (AI) to analyse data in real-time and help secure online transactions by identi...
Cybervision is a full-cycle custom software development and IT consulting company, with development centers in Eastern Europe, provides custom technology and business inspired solutions. CyberVision's clients include financial and telecommunication companies from Fortune 500 and ...
(Backdoor:Win32/Cycbot.B)The Cycbot.b trojan virus (born October 13, 2010) is a backdoor that allows attackers unauthorized access and control of an infected Windows computer. After a computer is infected, the trojan connects to a specific IRC server and joins a specific channel ...
Cyclod is the title of a Apple II/IGS computer game published by Sirius Software Inc. in 1982. The game has the player controlling a cyclops character, represented in the game as an eyeball, on a mission to smash snakes. Game Play Each level in the game takes place within a room ...
Cycloidal Vibration Therapy (CVT) is type of non-invasive mechanical massage therapy that employs a specialized motor to generate non-percussive vibrations at its surface in three orthogonal directions. This type of three-dimensional (3D) cycloidal vibration (CV) has been shown t...
Cyclone3 is a free, open source modular content management framework and content management system engine. It is the first open source CMS using Mozilla Application Framework and has XUL administration frontend. It is licensed under the GNU General Public License.It is currently ...
Cydoor is a spyware and adware first detected in 2003.Cydoor softwareThe Cydoor software downloads advertisements from the Cydoor servers, to be displayed in the Cydoor-supported software. It is built as a program integrated into the parent application but is not uninstalled alon...
Cynapse is a private web software company that was incorporated in April 2001 in Mumbai, India and later in June 2006 in Delaware, United States.Although Cynapse is mostly a products company, it has also undertaken service projects for large software companies like Microsoft and ...
The Cypress TrueTouch touchscreen solution is based on the PSoC programmable system-on-chip architecture. The projected capacitive TrueTouch offers a single-chip touchscreen solution that can interpret up to 10 inputs from all areas of the screen simultaneously. This capability, ...