intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Accessing information

Xem 1-20 trên 1216 kết quả Accessing information
  • The article presents various approaches to the concept of "digital economy" and trends that put an effect on formation of competitiveness. It is concluded that the digital economy is a "digital" system of economic relations based on the use of information and communication technologies. Digital companies are becoming economic agents of the digital economy. The basic elements of a digital company are infrastructure (Internet access, SOFTWARE, telecommunications), e-business (conducting business through computer networks), e-Commerce (distribution of goods via the Internet).

    pdf5p longtimenosee09 08-04-2024 0 0   Download

  • The purpose of this research is to assess the traveller’s wayfinding behaviour of airport terminal access design. Airport wayfinding is defined as a process in which a traveller makes a decision to navigate using information support systems in order to arrive to destination successfully. Quantitative data is acquired to give meaningful results justifying the research outcomes and allow non-biased interpretation of the research results. It represents the process within the development of the methodology and the concept of airport terminal access design and human wayfinding behaviour.

    pdf5p longtimenosee09 08-04-2024 2 2   Download

  • Ebook Visual C# 2005 Demystified includes contents: Chapter 1: getting started with your first windows program, chapter 2: writing your first code, chapter 3: controls, chapter 4: storing information-data types and variables, chapter 5: letting the program do the math-arithmetic operators, chapter 6: making comparisons-comparison and logical operators, chapter 7: making choices-if and switch control structures, chapter 8: repeating yourself-loops and arrays, chapter 9: organizing your code with methods, chapter 10: helper forms, chapter 11: menus, chapter 12: toolbars, chapter 13: accessing...

    pdf402p longtimenosee08 31-03-2024 0 0   Download

  • Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

    pdf180p longtimenosee08 31-03-2024 3 0   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee05 31-03-2024 1 0   Download

  • This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine code to exploitation. In addition, this edition features a bootable LiveCD based on Ubuntu Linux that can be used in any computer with an x86 processor, without modifying the computer’s existing OS. Ebook Hacking: the art of exploitation (2nd edition): Part 2 includes contents: 0x500: Shellcode, 0x600: Countermeasures, 0x700: Cryptology, 0x800: Conclusion.

    pdf198p longtimenosee05 31-03-2024 1 0   Download

  • Ebook How to cheat at securing a wireless network - Part 1 includes contents: Chapter 1: introduction to wireless: from past to present, chapter 2: wireless security, chapter 3: dangers of wireless devices in the workplace, chapter 4: WLAN rogue access point detection and mitigation, chapter 5: wireless LAN VLANs, chapter 6: designing a wireless network, chapter 7: wireless network architecture and design.

    pdf286p longtimenosee05 31-03-2024 0 0   Download

  • In this book, we cover a wide variety of technologies and show you how to configure those technologies specifically for use in the JBoss Application Server. Naturally, this can’t be done in a vacuum, so we provide simple examples that illustrate the technology and then walk you through the steps necessary to configure things such as deployment descriptors, access control, and encryption. Our intent isn’t to describe every nuance of any particular technology. For that, we recommend that you read books particular to those technologies (and we provide references at the end of most chapters).

    pdf496p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Lift in action: The simply functional web framework for scala – Part 2 includes contents: Chapter 6 common tasks with lift webkit; chapter 7 sitemap and access control; chapter 8 HTTP in lift; chapter 9 AJAX, wiring, and comet; chapter 10 persistence with mapper; chapter 11 persistence with record; chapter 12 localization; chapter 13 distributed messaging and java enterprise integration; chapter 14 application testing; chapter 15 deployment and scaling.

    pdf299p longtimenosee05 31-03-2024 0 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 1 includes contents: Chapter 1 the journey toward information security: an overview; chapter 2 domain 1: access controls; chapter 3 domain 2: administration; chapter 4 domain 3: auditing and monitoring.

    pdf235p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Network security illustrated: Part 2 includes contents: Part VII hardening networks, part VIII storing information, part IX hiding information, part X accessing information, part XI ensuring availability, part XII detecting intrusions.

    pdf217p longtimenosee05 31-03-2024 0 0   Download

  • This book presents an overview and critique of online business security systems with emphasis on common electronic commerce activities and payment systems. It discusses legal, compliance and ethical issues that affect management and administration of online business systems. The book introduces the reader to concepts underlying online business systems, as well as technologies that drive online business processes.

    pdf231p longtimenosee05 31-03-2024 0 0   Download

  • In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.

    pdf275p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Professional penetration testing creating and operating a formal hacking lab: Part 2 includes contents: Chapter 9: information gathering, chapter 10: vulnerability identification, chapter 11: vulnerability verification, chapter 12: compromising a system and privilege escalation, chapter 13: maintaining access, chapter 14: covering your tracks, chapter 15: reporting results, chapter 16: archiving data, chapter 17: cleaning up your lab, chapter 18: planning for your next pentest.

    pdf288p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 1 0   Download

  • In the era of 4.0, the development of infrastructure of the railroad transportation system is facilitated by the use of Information and Communication Technology. This is in line with the increasing needs of users of railway transportation.

    pdf5p longtimenosee07 29-03-2024 2 2   Download

  • This paper analyses a variety of widely accessible internet news stories, while literature on this subject is scarce, in order to explore the depths, and who creates them, how deep technological advantages and risks are, which example of deepfake occur and how the depths are to be gauged. We will use qualitative research methodology to gather the available information and based on the findings, in the end, we will conclude the discussions along with recommendations.

    pdf4p longtimenosee07 29-03-2024 2 2   Download

  • Genetic information is increasingly relevant across healthcare. Traditional genetic counseling (GC) may limit access to genetic information and may be more information and support than some individuals need. We report on the application and clinical implications of a framework to consistently integrate genetics expertise where it is most useful to patients.

    pdf12p vibransone 28-03-2024 2 2   Download

  • Identification of clinically significant genetic alterations involved in human disease has been dramatically accelerated by developments in next-generation sequencing technologies. However, the infrastructure and accessible comprehensive curation tools necessary for analyzing an individual patient genome and interpreting genetic variants to inform healthcare management have been lacking.

    pdf12p vibransone 28-03-2024 1 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2