![](images/graphics/blank.gif)
Application domains
-
Recent attacks, infections, and malicious code are mostly exploited by hackers as a potential vulnerability on unsecured user computers. The issue for administrators is how to protect hundreds of computers within the organization from such insecurity.
6p
tuetuebinhan000
23-01-2025
2
2
Download
-
Giải pháp chia sẻ và bảo mật mạng với Proxy Server .Khái quát Chúng ta sẽ xây dựng Firewall theo kiến trúc application-level gateway, theo đó một bộ chơng trình proxy đợc đặt ở gateway ngăn cách một mạng bên trong (Intranet) với Internet. Bộ chơng trình proxy đợc phát triển dựa trên bộ công cụ xây dựng Internet Firewall TIS (Trusted Information System), bao gồm một bộ các chơng trình và sự đặt lại cấu hình hệ thống để nhằm mục đích xây dựng một firewall. Bộ chơng trình đợc thiết kế để chạy trên hệ UNIX sử dụng TCP/IP với giao...
24p
conquynho32
16-09-2012
123
22
Download
-
Time series analysis is an essential field in data analysis, particularly within forecasting and prediction domains. Researching and building time series models play a crucial role in understanding and predicting the temporal dynamics of various phenomena. In mathematics, time series data is defined as data points indexed in chronological order and have a consistent time interval between consecutive observations.
10p
vibenya
31-12-2024
3
2
Download
-
Chapter 6: Application Layer. Overview of Transport Layer, HTPP and Web, domain name, electrical Email, file transfer. Request and response messages, request and status lines, header format, domain name space, domain names and labels, query and response messages, header format
74p
registergmxt
27-05-2018
43
5
Download
-
Normally, any ferromagnetic or ferrimagnetic material undergoes a transition to a paramagnetic state above its Curie temperature. Superparamagnetism is different from this standard transition since it occurs below the Curie temperature of the material. Superparamagnetism occurs in nanoparticles which are single domain. This is possible when their diameter is below 3–50 nm, depending on the materials.
33p
thinh3m
28-03-2013
62
5
Download
-
Bài giảng "Nhập môn mạng máy tính - Chương 6: Lớp Application (Lớp ứng dụng)" cung cấp cho người học các kiến thức cơ bản về lớp Application, Domain Name System (DNS), Telnet, File Tranfer Protocol (FTP), E-Mail, World Wide Web (WWW). Hi vọng đây sẽ là một tài liệu hữu ích dành cho các bạn sinh viên chuyên ngành Công nghệ thông tin dùng làm tài liệu học tập và nghiên cứu.
90p
nhasinhaoanh_06
17-09-2015
168
18
Download
-
Chapter 1: Undertanding the .NET Framework overview .NET Framework; understanding the common language runtime; understanding the managed excution process; understanding assemblies and the global assembly cache; cogfiguration and security; application domains and run times hosts.
35p
cocacola_09
23-11-2015
63
3
Download
-
Bài giảng "Mạng máy tính - Chương 2: Giao thức tầng ứng dụng (application layer)" cung cấp cho người học các kiến thức: File Transfer Protocol, Domain Name System, Electronic Mail Protocols. Mời các bạn cùng tham khảo nội dung chi tiết.
22p
doinhugiobay_12
15-01-2016
61
3
Download
-
Bài giảng "Mạng máy tính - Chương 2: Giao thức tầng ứng dụng (application layer)" cung cấp cho người học các kiến thức: Một số khái niệm và nguyên tắc, Web & Hyper Text Transfer Protocol, Web design and HTTP, Web programming. Mời các bạn cùng tham khảo.
22p
doinhugiobay_12
15-01-2016
71
2
Download
-
Once entirely the domain of space-borne applications, the effects of high energy charged particles on electronics systems is now also a concern for terrestrial devices. Reconfigurable components such as FPGAs are particularly vulnerable to radiation single event effects (SEU) as they carry a large amount of memory within a relatively small amount of circuit area. This thesis presents a Silicon on Insulator (SOI) based configuration memory system in a radiation hard reconfiguration system.
101p
runthenight05
01-03-2023
13
3
Download
-
By clarifying the mechanism between organisational social capital and social innovativeness of Australian social enterprises, this thesis model contributes to a richer understanding of the organisational social capital theory of innovativeness from a strategic perspective. Further, the rigorous demonstration of the mechanism of developing innovativeness extends the organisational social capital and innovativeness relationship into a new, previously overlooked application area, the social enterprise context.
336p
runthenight04
02-02-2023
4
3
Download
-
This thesis is organized into five chapters. In chapter 1, I give an introduction to remotely-sensed data and its application in various domains. A problem statement is also presented. Theoretical backgrounds in remote sensing, compositing methods and land cover classification methods are introdu ced.
39p
tamynhan0
04-07-2020
21
5
Download
-
The resulting model is a Document Retriever, called QASA, which is then integrated with a machine reader to form a complete open-domain QA system. Our system is thoroughly evaluated using QUASAR-T dataset and shows surpassing results compared to other state-of-the-art methods.
67p
tamynhan1
13-06-2020
22
4
Download
-
This thesis proposes a new method to determine moving objects by applying some motion estimation techniques in the video compression domain. At the same time, this method will also be used to build an application that supports the identification and search of motion in home surveillance videos. The compression format of the videos in the thesis uses H264 compression (MPEG-4 part10), a popular video compression standard today.
53p
hanh_tv25
02-04-2019
25
4
Download
-
Chapter summary: Bridges selectively relay packets between network segments, depending on their data-link layer destination addresses; bridges maintain a single broadcast domain and create separate collision domains; switches improve on the function of bridges by forwarding packets only to their destination systems;...and other contents.
16p
tangtuy08
21-04-2016
44
3
Download
-
Biomimetic recognition elements employed for the detection of analytes are commonly based on proteinaceous affibodies, immunoglobulins, single-chain and single-domain antibody fragments or aptamers. The alternative supra-molecular approach using a molecularly imprinted polymer now has proven utility in numerous applications ranging from liquid chromatogra-phy to bioassays.
10p
media19
04-03-2013
53
3
Download
-
There have been many approaches to solving problems associated with pro-tein solubility. This article describes the application of directed evolution to improving the solubility of the C-terminal metal-binding domain of amino-peptidase P fromEscherichia coli.
10p
media19
04-03-2013
34
2
Download
-
Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.
20p
trinh02
28-01-2013
82
3
Download
-
Tường lửa và Filtering Proxy servers làm việc ở lớp Application, lớp 7 trong mộ hình tham chiếu OSI. Chúng không được phổ biến như các tường lửa thông thường mà làm việc ở mức thấp hơn và hỗ trợ lọc ứng dụng một cách độc lập. Proxy servers cũng khó khăn hơn trong việc cài đặt và duy trì so với tường lửa. Mặc dù vậy, nếu proxy server được cấu hình đúng cách sẽ cải thiện được vấn đề bảo mật và hiệu suất cho mạng. Các proxy đều có khả năng mà các tường lửa thông thường...
3p
bibocumi27
16-01-2013
123
18
Download
-
MULTIPLE POSITIVE SOLUTIONS OF SINGULAR p-LAPLACIAN PROBLEMS BY VARIATIONAL METHODS KANISHKA PERERA AND ZHITAO ZHANG Received 20 July 2004 We obtain multiple positive solutions of singular p-Laplacian problems using variational methods. The techniques are applicable to other types of singular problems as well. 1. Introduction We consider the singular quasilinear elliptic boundary value problem −∆ p u = a(x)u−γ + λ f (x,u) in Ω, (1.1) u 0 in Ω, u = 0 on ∂Ω, where Ω is a bounded C 2 domain in Rn ,n ≥ 1, ∆ p u = div(|∇u| p−2 ∇u) is the p-Laplacian, 1 0 is a constant, λ...
6p
sting12
10-03-2012
44
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)