intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Operations security

Xem 1-20 trên 692 kết quả Operations security
  • Part 2 book "Power quality in power systems and electrical machines" includes content: Power system modeling under nonsinusoidal operating conditions, impact of poor power quality on reliability, relaying, and security, the roles of filters in power systems, optimal placement and sizing of shunt capacitor banks in the presence of harmonics, unified power quality conditioner (UPQC),... and other contents.

    pdf373p dianmotminh03 17-06-2024 0 0   Download

  • The research underscores the urgent need to adopt Blockchain technology in higher education to address the prevalent issues of cheating and hacking in student registration systems. These unethical practices negatively impact fairness and integrity within the educational sector. Blockchain and Smart Contracts offer a solution by ensuring secure, tamper-proof recording of academic records, which enhances transparency and operational efficiency.

    pdf5p viambani 18-06-2024 5 1   Download

  • The research aims to propose solutions for mergers between Vietnamese securities companies to improve the financial capacity of securities companies currently operating on the Vietnam Stock Exchange - VNX (HNX, HoSE and Upcom exchanges). Through research samples collected from 27 Vietnamese securities companies in the period from 2014 to 2021, secondary data are audited financial statements and financial safety reports. By using the quantitative research method of principal component analysis PCA (Principal Component Analysis) and K-means (cluster) analysis on SPSS 20 software.

    pdf8p leminhvu111 07-06-2024 1 0   Download

  • By the time you finish this book, you’ll know how to: Work with the JUNOS network operating system; Set up and configure a Juniper router; Connect, manage, and trouble shoot routers and other Juniper appliances; Make your network more efficient; Configure JUNOS default security features as well as restricted physical access to protect routers; Solve hardware, software, interface, and router problems; Integrate JUNOS with other systems.

    pdf410p zizaybay1104 29-05-2024 2 1   Download

  • Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.

    pdf324p giangdongdinh 28-05-2024 3 1   Download

  • This study aims not only to examine the definition of payment to contractor in investment construction operations but also to outline existed legal corridor promulgated to secure the contractor’s payment. Using the systematic analyzing method of previous researches, some types of Vietnam legal documents and other countries to determine what the payment to contractor is and how it is safeguarded by legal corridor in Vietnam.

    pdf7p viohoyo 25-04-2024 2 2   Download

  • Part 2 book "Networking - The complete reference" by author Bobbi Sandberg includes content: TCP/IP, other TCP/IP protocols; the domain name system; internet services, windows chapter 18 active directory; linux; unix; other network operating systems and networking in the cloud, network clients; network security basics; wireless security; overview of network administration; network management and troubleshooting tools; backing up.

    pdf426p muasambanhan10 11-04-2024 6 1   Download

  • Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.

    pdf402p muasambanhan10 11-04-2024 2 1   Download

  • The aims of this study is to examine the effect of security, quality of service, operations and information management and trustworthiness on Eloyalty customer moderated by customer satisfaction for online shop website. The sample was taken using random sampling technique as many as 1300 respondents. The data was tabulated and processed using questionnaires, interviews, observation and documentation. The results of this study showed that security, information management, reliability and trustworthiness has positive and direct impact on customer satisfaction.

    pdf9p longtimenosee09 08-04-2024 1 0   Download

  • One of the main trends in the law development is its digitalization under the supply chain strategies, which is manifested both in the digitalization of legal regulation, legal technologies, legal processes and law enforcement. In the emergence of regulations affecting the issues of the digital economy, electronic state, information security.

    pdf6p longtimenosee09 08-04-2024 4 0   Download

  • Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.

    pdf589p longtimenosee08 31-03-2024 2 1   Download

  • The Cisco Certified Internet Expert Security Certification is an increasingly popular internetworking certification and one of the most popular security certifications in the world. Although CCIE certification builds on the foundation you might have established from the Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professional (CCNP) certifications, there is no prerequisite to attempt to gain CCIE certification. However, attaining CCNA and CCNP certifications will help you understand Cisco subjects and testing strategies.

    pdf524p longtimenosee08 31-03-2024 2 1   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 2 1   Download

  • Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

    pdf180p longtimenosee08 31-03-2024 6 1   Download

  • Ebook Hardware hacking: Have fun while voiding your warranty – Part 2 includes contents: Chapter 8 hack your atari 5200 and 8-bit computer, chapter 9 hacking the playstation, chapter 10 wireless 802.11 hacks, chapter 11 hacking the ipod, chapter 12 can you hear me now? Nokia 6210 mobile phone modifications, chapter 13 upgrading memory on palm devices, chapter 14 operating systems overview, chapter 15 coding 101.

    pdf292p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Nokia security solutions handbook: Part 1 includes contents: Chapter 1 overview of the Nokia security platform, chapter 2 overview of the Nokia ipso operating system, chapter 3 initial configuration, chapter 4 introducing the voyager web interface, chapter 5 basic system administration.

    pdf177p longtimenosee05 31-03-2024 5 0   Download

  • In ebook Operating systems: A concept-based approach - Part 2, the following content will be discussed: Chapter 11: memory management, chapter 12: virtual memory, chapter 13: file systems, chapter 14: implementation of file operations, chapter 15: security and protection, chapter 16: distributed operating systems, chapter 17: theoretical issues in distributed systems, chapter 18: distributed control algorithms, chapter 19: recovery and fault tolerance, chapter 20: distributed file systems, chapter 21: distributed system security.

    pdf469p longtimenosee05 31-03-2024 3 0   Download

  • In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.

    pdf275p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Operating systems internals and design principles (7th edition) - Part 2 includes contents: Chapter 7 memory management; chapter 8 virtual memory; chapter 9 scheduling: uni-processor scheduling; chapter 10 multi-processor and real time scheduling; chapter 11 i/o management and disk scheduling; chapter 12 file management; chapter 13 embedded operating systems; chapter 14 computer security threats; chapter 15 computer security techniques; chapter 16 distributed processing, client/server , and clusters.

    pdf495p longtimenosee05 31-03-2024 3 0   Download

  • In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access with backdoors and malware, chapter 10 reporting, chapter 11 working with defensive and detection systems, chapter 12 covering your tracks and evading ...

    pdf287p longtimenosee05 31-03-2024 2 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1226 lượt tải
207 tài liệu
1444 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2