Xem 1-20 trên 22 kết quả Computer insecurity
  • In most computers, individual instructions are stored as machine code with each instruction being given a unique number (its operation code or opcode for short). The command to add two numbers together would have one opcode, the command to multiply them would have a different opcode and so on. The simplest computers are able to perform any of a handful of different instructions; the more complex computers have several hundred to choose from, each with a unique numerical code. Since the computer's memory is able to store numbers, it can also store the instruction codes.

    pdf194p khangoc2399 21-09-2012 17 5   Download

  • Though considerably easier than in machine language, writing long programs in assembly language is often difficult and is also error prone. Therefore, most practical programs are written in more abstract high-level programming languages that are able to express the needs of the programmer more conveniently (and thereby help reduce programmer error). High level languages are usually "compiled" into machine language (or sometimes into assembly language and then into machine language) using another computer program called a compiler.

    pdf24p khangoc2399 21-09-2012 24 4   Download

  • If you’ve made it this far, you’re clearly among the growing number of people who are curious about Linux. I’m not sure what has led you here – perhaps you’re sick of installing security updates every other day, perhaps you’re tired of rebooting when your computer runs slowly, or maybe you’ve just had enough of the Blue Screen of Death – but whatever it was that brought you here, I’m glad to welcome you to the family of Linux users, and hope you’ll find that there’s a whole new...

    pdf130p khangoc2399 21-09-2012 37 3   Download

  • The set of arithmetic operations that a particular ALU supports may be limited to addition and subtraction, or might include multiplication, division, trigonometry functions such as sine, cosine, etc., and square roots. Some can only operate on whole numbers (integers) whilst others use floating point to represent real numbers, albeit with limited precision. However, any computer that is capable of performing just the simplest operations can be programmed to break down the more complex operations into simple steps that it can perform.

    pdf197p khangoc2399 21-09-2012 15 2   Download

  • Programming languages provide various ways of specifying programs for computers to run. Unlike natural languages, programming languages are designed to permit no ambiguity and to be concise. They are purely written languages and are often difficult to read aloud. They are generally either translated into machine code by a compiler or an assembler before being run, or translated directly at run time by an interpreter. Sometimes programs are executed by a hybrid method of the two techniques.

    pdf147p khangoc2399 21-09-2012 23 1   Download

  • Reference Material W. Richard Stevens, TCP/IP Illustrated, Volume 1 The Protocols, Addison-Wesley Eric A. Hall, Internet Core Protocols, O’Reilly Craig H. Rowland, “Covert Channels in the TCP/IP Protocol Suite”, www.psionic.com/papers/covert/covert.tcp.txt Ofir Arkin, “ICMP Usage in Scanning”, www.sys-security.com Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting” www.insecure.org/nmap/nmap-fingerprinting-article Thomas Ptacek, Timothy Newsham, “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, www.robertgraham.

    pdf13p huyhoang 07-08-2009 133 16   Download

  • Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult.

    pdf792p titatu_123 01-03-2013 23 12   Download

  • pring Security 3.1" is an incremental guide that will teach you how to protect your application from malicious users. You will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples. This book is centred around a security audit of an insecure application and then modifying the sample to resolve the issues found in the audit.

    pdf456p titatu_123 01-03-2013 30 9   Download

  • Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which allows users to download, copy and build upon published articles even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications.

    pdf280p khangoc2399 21-09-2012 20 8   Download

  • Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work.

    pdf162p khangoc2399 21-09-2012 23 5   Download

  • Tham khảo sách 'microsensors by igor v. minin and oleg v. minin', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf306p khangoc2399 21-09-2012 22 5   Download

  • Recent Developments in Mobile Communications – A Multidisciplinary Approach Edited by Juan P. Maícas Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which allows users to download, copy and build upon published articles even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications.

    pdf284p khangoc2399 21-09-2012 27 4   Download

  • The responses.properties and global.properties files are protected by access controls on the $VCLOUD _ HOME/etc folder and the files themselves. Do not change the permissions on the files or folder as it may either give too much access, reducing security, or restrict access too much, stopping the VMware vCloud Director software from working. In order for the access controls to properly work, physical and logical access to the VMware vCloud Director servers must be strictly limited to those with a need to log in and only with the minimal levels of access required.

    pdf0p cao_can 02-01-2013 20 4   Download

  • Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work.

    pdf0p khangoc2399 21-09-2012 21 3   Download

  • Tham khảo sách 'recent application in biometrics edited by jucheng yang and norman poh', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p khangoc2399 21-09-2012 48 3   Download

  • Diving for bodies was not one of Scott Markman’s favorite things. He gazed across the open water at the big orange ball creeping up over the forest horizon. A passing Florida breeze rippled the glassy lake-top and caused swirls within the fading layer of fog lingering at the water’s surface. Markman found himself wishing he were somewhere else. Kneeling awkwardly on the flexible, black bottom of the rubber boat, he wormed the new regulator mouthpiece back into his sore mouth and sucked test air from the fresh aluminum tank. With his left hand he wiggled the black wrap-around mask down...

    pdf188p khangoc2399 21-09-2012 29 3   Download

  • Tham khảo sách 'windows® 7 resource kitmitch tulloch, tony northrup, and jerry honeycutt', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf51p khangoc2399 21-09-2012 21 2   Download

  • These are exciting times for Indian renewable energy, and especially so for solar and wind energy. Investments in renewable energy industry in India have increased from a meager $94.58 million in 2001 to $3.7 billion in 2008, and about $7.2 billion by 2009 - at a CAGR of 72%. A significant part of these investments were in wind energy. For the past few years China has been doubling its cumulative wind energy installed capacity, and by end of 2009, the country had a cumulative installed capacity of 25.1 GW, from 12.1 GW for end-2008 - over 100% growth! During the...

    pdf23p khangoc2399 21-09-2012 16 1   Download

  • Ebooks - some authors hate them. Baroness P.D. James, president of the Society of Authors, finds ebooks ‘unattractive’. Many authors and readers much prefer the look, feel and even smell of a physical book. Some technophobes just hate them on principal whilst others, particularly those of us somewhat longer in the tooth can find the whole subject rather intimidating. JK Rowling

    pdf18p khangoc2399 21-09-2012 12 1   Download

  • Operating systems and software are written to be functional and easy to use and install. Otherwise vendors will have a hard time selling them ;-) Unfortunately they generally come configured insecure (or less secure that possible) out of the box. There are two important terms we need to understand in regards to securing systems out of the box.

    ppt68p doilan 25-01-2013 12 1   Download

Đồng bộ tài khoản