Overview [1]#
Implementation is the realization of an application, or execution of a plan, idea, framework, design, specification, standard, algorithm, or policy.
For our discussions
The development process life cycle is Implementation --> Architecture --> Implementation --> Metric Analysis --> rinse and repeat.
The development process life cycle is Implementation --> Architecture --> Implementation --> Metric Analysis --> rinse and repeat.
More Information#
There might be more information for this subject on one of the following:- 6LoWPAN
- APEX
- AWS Amazon MQ
- Access Control Models
- Algorithm
- Application Programming Interface
- Architecture
- Automatic Certificate Management Environment
- Best Practices OpenID Connect
- Big Design Up Front
- Bonjour
- Boulder
- Building Automation
- Certificate Validation
- Change-password
- Channel Binding
- Cipher Suite
- Classifier
- Client Device
- Cloud Native
- Command-line
- Common Criteria for Information Technology Security Evaluation
- Configuration Management
- Cryptanalysis
- Cryptography
- DECnet
- DID Operations
- DNS Privacy Considerations
- DNSCrypt
- Data Encapsulation Method
- Data-centric
- Deprecating TLSv1.0 and TLSv1.1
- Design
- Direct Anonymous Attestation
- Discrimination
- Distinguished Names
- Domain-Driven Design
- DomainKeys Identified Mail
- Event System
- Fast Healthcare Interoperability Resources
- Fetch API
- Fine Grained Password Policies
- Function
- GRUB
- Geneva Framework
- Grant Types
- HTTP Method
- Human-Centered Design
- Hybrid cryptosystem
- Hyper Text Coffee Pot Control Protocol
- ISO Development Environment
- IT Infrastructure Library
- Implementation
- Implementation Vulnerability
- JSON Web Token Best Current Practices
- LDAP Signing
- Legitimacy of Social Login
- MITRE Corporation
- MITREid Connect
- MSRPC
- MUST
- Message Passing Interface
- Message-oriented Middleware
- Middleware
- MimbleWimble
- ModifyTimestamp
- NIST.SP.800-57
- OAuth 2.0 Device Authorization Grant
- OAuth 2.0 Incremental Authorization
- OAuth 2.0 Token Binding
- OAuth 2.0 Token Exchange Request
- OAuth and OIDC Adoption
- Open Access
- OpenID Connect Client Initiated Backchannel Authentication Flow
- OpenID Foundation
- OpenThread
- Passwordless SMS Authentication
- Platform Authenticator
- Policy
- Policy Core Information Model
- Portable Document Format
- Production tier
- RAND-Z
- RCS Chat
- RFC 1035
- Red Green Refactor
- Rich Communication Services
- Roaming Authenticator
- Roots of Trust
- SPNEGO
- SQL Injection
- Satoshi Nakamoto
- Security Support Provider
- Sender Policy Framework
- Service
- Side-channel attacks
- Single Sign-On
- Stream Control Transmission Protocol
- Thread network layer
- Time slicing
- Tink
- Transport Layer Security
- Two-Factor Authentication
- Verifiable Claims
- Virtual Authenticator
- WebAuthn Authenticator Model
- WebAuthn Client
- WebAuthn Client Device
- Windows Hello
- XDAS for eDirectory
- [#1] - Implementation
- based on information obtained 2017-08-12-