intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Internet technologies

Xem 1-20 trên 959 kết quả Internet technologies
  • The article presents various approaches to the concept of "digital economy" and trends that put an effect on formation of competitiveness. It is concluded that the digital economy is a "digital" system of economic relations based on the use of information and communication technologies. Digital companies are becoming economic agents of the digital economy. The basic elements of a digital company are infrastructure (Internet access, SOFTWARE, telecommunications), e-business (conducting business through computer networks), e-Commerce (distribution of goods via the Internet).

    pdf5p longtimenosee09 08-04-2024 0 0   Download

  • This paper first defines key concepts and outlines applications of AI and IoT independently in areas like transportation, energy, environment, and public safety. It then examines how both technologies can be integrated for mutual benefit.

    pdf10p vilarry 01-04-2024 1 0   Download

  • CCNP BCMSN Exam Certification Guide is a complete study tool for the CCNP BCMSN exam, allowing you to assess your knowledge, identify areas in which to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills to implement appropriate technologies to build scalable, multilayer switched networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCNP exam preparation.

    pdf633p longtimenosee08 31-03-2024 2 0   Download

  • In Hacking a terror network: The silent threat of covert channels, Russ Rogers uses a fictional scenario to demonstrate how terrorists may use the Internet to coordinate and launch a new series of terrorist attacks.While the scenario may be fictitious, the techniques and technologies that Russ uses are drawn straight from the computer security world, making this not only an interesting literary read but also a technical manual on how covert channels work and how law enforcement and intelligence organizations can go about discovering and defeating them.

    pdf400p longtimenosee05 31-03-2024 3 0   Download

  • Ebook Multimedia forensics & security - Part 1 includes contents: Chapter I: Authentication watermarkings for binary images; Chapter II: Secure multimedia content distribution based on watermarking technology; Chapter III: Digital watermarking in the transform domain with emphasis on SVD; Chapter IV: Digital video watermarking and the collusion attack; Chapter V: A survey of current watermarking synchronization techniq; Chapter VI: On the necessity of finding content before watermark retrieval: active search strategies for localising watermarked media on the internet; Chapter VII: Statistic...

    pdf183p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Mission critical internet security: Part 2 includes contents: Chapter 6 Microsoft RAS and VPN for Windows 2000, Chapter 7 securing your network with Microsoft Proxy Server 2.0, Chapter 8 traffic filtering on Cisco IOS, Chapter 9 configuring and securing the Cisco PIX Firewall, Chapter 10 axent technologies raptor firewall 6.5, Chapter 11 check point software’s check point firewall-1.

    pdf320p longtimenosee05 31-03-2024 0 0   Download

  • This paper analyses a variety of widely accessible internet news stories, while literature on this subject is scarce, in order to explore the depths, and who creates them, how deep technological advantages and risks are, which example of deepfake occur and how the depths are to be gauged. We will use qualitative research methodology to gather the available information and based on the findings, in the end, we will conclude the discussions along with recommendations.

    pdf4p longtimenosee07 29-03-2024 2 2   Download

  • The research aimed is to develop and to evaluate the supply chain model for curriculum management based on Thailand qualifications framework for higher education with the internet of things. The research sample totaling ten experts consisted of three experts on supply chain , two experts on information technology and three experts on electrical engineering and two expert on curriculum . All of them must have more than five years’ experience The employed research instrument is a questionnaire.

    pdf7p longtimenosee07 29-03-2024 2 2   Download

  • The agri-food supply chain (ASC), integral to global sustenance, faces pressing challenges related to transparency and traceability. This systematic literature review (SLR) delves into the transformative potential of emerging digital technologies, namely Blockchain, IoT, and Digital Financial Solutions, in addressing these challenges. Through a rigorous selection process, 88 papers were meticulously reviewed, revealing a growing academic interest in the domain.

    pdf16p longtimenosee07 29-03-2024 2 2   Download

  • This paper aims to evaluate the nature of halal risk management by focusing on the advent of online business. Globally, there is a growing trend of halal trading activities from inbound to outbound stages in a virtual marketplace utilising the advancement of online technology. With reference to MS 2400: 2010, an organization must establish a Halalan-Toyyiban Risk Management Plan (HTRMP) following the principles outlined in the standard. This means, beside Halal, the elements for Toyyib should also be considered during risk management, namely the physical, chemical and biological aspects.

    pdf6p longtimenosee06 27-03-2024 2 2   Download

  • The paper presents the results of analyzing the trend of the digitalization process. It is concluded that public policy is the main factor and tool for the development of the digital supply chain of economy, and a forecast is made for the number of participants using various types of communication.

    pdf8p longtimenosee06 27-03-2024 2 2   Download

  • The advent of digital transformation within supply chains heralds a new era of efficiency, innovation, and resilience. This paper explores the multifaceted impact of digital technologies—such as the Internet of Things (IoT), artificial intelligence (AI), blockchain, and cloud computing—on supply chain management.

    pdf9p longtimenosee06 27-03-2024 5 3   Download

  • The article discusses the basics of the digital supply chain management, its characteristic features and scope of application are covered. The analysis of a condition of development of digital supply chain management in the world reflecting growth of its share in gross domestic product, and the Russian Federation for which characteristic is the state initiative of advance and development of digital processes, but not business structures is carried out.

    pdf7p longtimenosee04 06-03-2024 2 1   Download

  • Digitization has become the dominant theme in discussions about the future of supply chains. Wherever there is a problem, there is the promise of a technological solution, using some combination of artificial intelligence or machine learning, big data, automation, and the Internet of Things. The article actualizes the problems of the impact of digitalization of supply chain on the formation and transformation of human capital and, above all, the formation of new competencies, knowledge and skills.

    pdf9p longtimenosee04 06-03-2024 3 2   Download

  • Industry 4.0 includes technologies such as Internet of Things (IoT), Big Data Analytics, Smart Factory, Cyber Physical Systems, Blockchain, Machine Learning and Artificial Intelligence. Supply Chain is a field which involves numerous day to day activities such as planning, procurement, warehousing, transportation etc. With such activities also comes a huge amount of data.

    pdf5p longtimenosee04 06-03-2024 2 0   Download

  • Ebook Firewalls and internet security (Second edition): Part 1 includes content: Chapter 1 introduction; chapter 2 a security review of protocols: lower layers; chapter 3 security review: the upper layers; chapter 4 the web: threat or menace?; chapter 5 classes of attacks; chapter 6 the hacker's workbench, and other munitions; chapter 7 authentication; chapter 8 using some tools and services.

    pdf193p longtimenosee03 22-02-2024 3 2   Download

  • Ebook Firewalls and internet security (Second edition): Part 2 includes content: Chapter 9 kinds of firewalls, chapter 10 filtering services, chapter 11 firewall engineering, chapter 12 tunneling and VPNs, chapter 13 network layout, chapter 14 safe hosts in a hostile environment, chapter 15 intrusion detection, chapter 16 an evening with berferd, chapter 17 the taking of clark, chapter 18 secure communications over insecure networks, chapter 19 where do we go from here?, appendix a an introduction to cryptography, appendix b keeping up.

    pdf263p longtimenosee03 22-02-2024 3 2   Download

  • Part 1 of ebook "Mission-critical network planning" includes content: network continuity versus disaster recovery; the case for mission-critical planning; principles of continuity; continuity metrics; network topology and protocol considerations for continuity; networking technologies for continuity; processing, load control, and internet-working for continuity; network access continuity;;...

    pdf227p longtimenosee03 22-02-2024 2 2   Download

  • The third generation (3G) of mobile networks introduces wide spectrum and high data rates as well as variety of circuit-switched and packet-based services. It provides IP connectivity besides the circuit switching. Future generation mobile systems are expected to include heterogeneous access technologies, such as wireless LAN and 3G, as well as end-to-end IP connectivity (i.e., an all-IP network). The diversity of traffic services and access technologies creates new possibilities for both operators and users. On the other hand, it raises new traffic and design issues.

    pdf385p longtimenosee03 22-02-2024 4 2   Download

  • In ebook "Food biotechnology in ethical perspective (Second edition)" Thompson’s unique and insightful approach to addressing the risks and questions of public acceptability associated with novel technology stands as a model for anyone interested in technological innovation and social change. The book should be of interest to scholars and citizens interested in the Internet or nanotechnology, while it remains an essential resource for understanding the twists and turns of debate over the role of molecular genetics in the transformation of the global food system.

    pdf340p manmanthanhla0201 27-02-2024 3 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2