intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Communication security

Xem 1-20 trên 716 kết quả Communication security
  • For secure communications, the authors propose a underwater wireless optical communications code-division multiple-access (UOWC/CDMA) system with multiple relay assistance. Relay nodes employ the Chip Detect-and-Forward (CDF) technique to prevent the difficult multiuser decoding procedure. The proposed system performance, in terms of bit-error rate (BER) and transmission confidentiality, is analyzed in our study over fading channel.

    pdf11p vithomson 02-07-2024 0 0   Download

  • In this paper, we show that there is a certain interval of input intensity, in which the transmission coefficients overlap one to other. This behaviors of SNC can be used to generate random signals. Using the expression described the output-input power relation, the expression of the optical merge signal, carrier signal and coded-carrier signal, the overlapping region of the input intensity is numerically observed.

    pdf9p viambani 18-06-2024 4 1   Download

  • The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag.

    pdf525p zizaybay1103 29-05-2024 1 1   Download

  • The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.

    pdf372p zizaybay1103 29-05-2024 5 2   Download

  • Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.

    pdf360p zizaybay1103 29-05-2024 2 2   Download

  • Continued part 1, part 2 of ebook "Building systems for interior designers (Third edition)" provides readers with contents including: Part V - Heating, cooling, and ventilation systems; Part VI - Electrical and lighting systems; Part VII - Fire safety, conveyance, security, and communications;...

    pdf219p dongmelo 20-05-2024 1 0   Download

  • This study is conducted using qualitative research method to collect and analyse both primary and secondary data. Primary data was obtained through official documents and an in-depth interview with key informants among Malaysian households of the communities near Malaysia-Thailand border, local leaders and academicians. Meanwhile, the secondary source of data was obtained from published materials and online documents such as books, journal articles and reports.

    pdf6p longtimenosee10 26-04-2024 2 1   Download

  • The data collected using purposive sampling and Slovin formula. The hypothesis of this research is tested by multiple linier regression. The research results showed that the variable site design, informative, security and communication have a partialy significant effect to the online shopping customer satisfaction, while the convenience of shopping variable is not significant. This understandable because each online store has different system and procedure that incovenience for consumers.

    pdf9p longtimenosee10 26-04-2024 4 1   Download

  • Ebook "Food security governance in the arctic-barents region" provides a multidisciplinary perspective on the major food security and safety challenges faced in the Arctic region. The authors address existing gaps in current knowledge of the coordination and implementation of legal framework and policy that affects the Arctic. The volume is unique in its focus on the Barents region, an area of northern Europe containing Norway, Sweden, Finland and Russia. The region has a population of approximately 5.2 million, including indigenous and non-indigenous peoples.

    pdf155p tracanhphuonghoa1007 22-04-2024 3 2   Download

  • Part 2 book "MATLAB for engineers – Applications in control, electrical engineering, it and robotics" includes content: Calculating radiation from power lines for power line communications; automatic modelling approach for power electronics converters - Code generation (C S function, modelica, VHDL-AMS) and MATLAB simulink simulation; PV curves for steady state security assessment with MATLAB;.... and other contents.

    pdf290p dianmotminh00 22-04-2024 5 4   Download

  • The study was carried out on the basis of work with grant of the RFBR No. 19-010-00040 “Interaction between the real and virtual sectors of the economy in order to increase their efficiency and ensure a balance of interests between business, society and the state”. This paper proposed to introduce integrated indicators of the effect of digitalization.

    pdf9p longtimenosee09 08-04-2024 6 2   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 3 1   Download

  • Ebook How to cheat at deploying securing RFID: Part 2 includes contents: Chapter 7 Performing Site Analysis; Chapter 8 Performing Installation; Chapter 9 Working with RFID peripherals; Chapter 10 Monitoring and Troubleshooting RFID Systems; Chapter 11 Threat and Target Identifi cation; Chapter 12 RFID Attacks: Tag Encoding Attacks; Chapter 13 RFID Attacks: Tag Application Attacks; Chapter 14 RFID Attacks: Securing Communications Using RFID Middleware; Chapter 15 RFID Security: Attacking the Backend; Chapter 16 Management of RFID Security.

    pdf197p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 1 building complexity, chapter 2 working with video, chapter 3 getting a handle on actionscript, chapter 4 advanced buttons and event handling, chapter 5 controlling multiple timelines, chapter 6 managing external communication.

    pdf243p longtimenosee05 31-03-2024 1 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 2 includes contents: Chapter 5 domain 4: risk, response, and recovery; chapter 6 domain 5: cryptography; chapter 7 domain 6: data communications; chapter 8 domain 7: malicious code; appendix a glossary; appendix b testing tools; appendix c references for further study; appendix d answers to sample questions.

    pdf296p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Firewalls and internet security (Second edition): Part 2 includes content: Chapter 9 kinds of firewalls, chapter 10 filtering services, chapter 11 firewall engineering, chapter 12 tunneling and VPNs, chapter 13 network layout, chapter 14 safe hosts in a hostile environment, chapter 15 intrusion detection, chapter 16 an evening with berferd, chapter 17 the taking of clark, chapter 18 secure communications over insecure networks, chapter 19 where do we go from here?, appendix a an introduction to cryptography, appendix b keeping up.

    pdf263p longtimenosee03 22-02-2024 4 2   Download

  • This book is not designed to be a general networking topics book; although, it can be used for that purpose. This book is intended to tremendously increase your knowledge level with regards to OSPF. Personnel responsible for understanding OSPF should read this book. You might need to understand OSPF because you are a programmer, network manager, network engineer, studying for certification, and so on.

    pdf768p longtimenosee03 22-02-2024 8 2   Download

  • Ebook Personal networks: Wireless networking for personal devices includes content: Chapter 1 the vision of personal networks, chapter 2 personal networks user requirements, chapter 3 trends in personal networks, chapter 4 the personal network architecture, chapter 5 cluster formation and routing, chapter 6 inter-cluster tunneling and routing, chapter 7 foreign communication, chapter 8 personal network application support systems, chapter 9 personal network security, chapter 10 personal network federations, chapter 11 personal network prototypes, chapter 12 the future of personal networks.

    pdf230p longtimenosee03 22-02-2024 5 2   Download

  • Ebook "Food security in Australia: Challenges and prospects for the future" considers the ability and capacity of the food supply system in Australia to provide food security for the ever-increasing domestic and international population in the face of growing challenges in production, resource supply and failures within the food system itself. Although Australia is a net food exporting country, domestic food insecurity exists and will increase as food prices rise in the coming decades.

    pdf483p nhanphanguyet 28-01-2024 5 2   Download

  • Ebook Brute force cracking the data encryption standard includes contents: Working Late, Keeping Secrets, Data Encryption Standard, Key Length, Discovery, RSA Crypto Challenges, Congress Takes Note, Supercomputer, Organizing DESCHALL, Needle in a Haystack, Spreading the Word, The Race Is On, Clients, Architecture, Progress, Trouble, Milestones, Gateways, Network, Download, Short Circuit, DESCHALL Community, Proposal,…

    pdf283p haojiubujain010 14-12-2023 6 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1228 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2