expand for answer

Symbolic execution

The analytical technique of dissecting each program path.


Similar items:
The address of a record (or other data grouping) contained in another record so that a program may access the former record when it has retrieved the latter record. The address can be absolute, relative, or symbolic, and hence the pointer is referred to as absolute, relative, or symbolic.
[view]
A p ro gramming language designed in the 1960s to teach students how to program and to facilitate learning. The powerful language syntax was designed especially for timesharing systems.
[view]
Notification of significant new trends or developments regarding the threat to the information system of an organization. This notification may include analytical insights into trends, intentions, technologies, or tactics of an adversary targeting information systems.
[view]
The capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. Forces attain information superiority through the acquisition of systems and familiesofsystems that are secure, reliable, interoperable, and able to communicate across a universal information technology (IT) infrastructure, to include National Security Systems (NSS). This IT infrastructure includes the data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities.
[view]
The manipulation of information to support decision making.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in