![](images/graphics/blank.gif)
Private key
-
The study encompasses various analytical techniques, including descriptive statistics, Cronbach’s Alpha, Exploratory Factor Analysis (EFA), multivariate regression models, and hypothesis testing through SPSS software. The findings reveal that six key factors, namely leadership, digital business strategy, employee capabilities, technology infrastructure, organizational culture, and external market pressures, exert significant influence on digital transformation in these enterprises.
10p
leminhvu111
07-06-2024
1
0
Download
-
This research delves into the assessment of Capital Adequacy Ratio (CAR) among Joint-Stock Commercial Banks (JSCBs) in Vietnam from 2015 to 2022. It investigates the variations in CAR over this period and explores its association with key financial metrics, including Return on Assets (ROA), Deposit Ratio (DEP), Liquidity (LIQ), Loan-to-Asset Ratio (LOA), Loan Loss Reserve (LLR), Non-Performing Loan Ratio (NPL), Leverage (LEV), bank size (SIZE), and the scale of board governance (BoardS).
9p
leminhvu111
07-06-2024
2
0
Download
-
This research study is an insight into the intricate relationship between macroeconomic factors and the performance of the Vietnam’s stock market. Drawing on an extensive dataset covering the recent five-year period, the study employs a multifaceted methodology that combines data analysis, time-series modeling, and sector-specific analysis to comprehensively evaluate the dynamic interactions between key macroeconomic indicators and stock market returns.
13p
leminhvu111
07-06-2024
0
0
Download
-
The corporate bond market (CBM) plays a very important role in the development of the financial market and the economy in each country. The supply of corporate bonds (CBs) is one of key factors contributing to the development of the market. On the basis of clarifying the role of corporate bond supply, the article focuses on evaluating the corporate bond supply of the Vietnamese corporate bond market (VCBM) in the period of 2019-2022, thereby proposing recommendations for developing the supply for the VCBM in the coming years.
7p
leminhvu111
07-06-2024
0
0
Download
-
The proposed method offers three-level protection the usage of AES algorithm and a secure personal key. The approach also provides data tankage privateness safety because of huge groups yet the discovery about sensitive facts tankage leaks. Our order gives some on the privateness practices ancient within wind computing services.
4p
longtimenosee06
27-03-2024
2
1
Download
-
This study provides insights on how PPPs can enable city administrations to play a key role for supporting climate sustainable agenda of nations especially in Sub Saharan Africa that is considered a victim of climate change and yet this part of the world is deemed to have been insignificantly responsible for the climate change by largely affected negative effects of today’s climate change.
14p
longtimenosee06
27-03-2024
3
2
Download
-
Malaysian nowadays prefer more on private transport such as car and motorcycle compared to public bus. This decision may be due to personal experience when the services do not meet the expected satisfaction. Understanding the key factors of bus performance is important because it related users’ loyalty and ridership issue. This article reviews an approach that acknowledged by previous studies in an interest of assisting public bus transportation planning that advantage of sustainable public transportation system.
4p
longtimenosee04
06-03-2024
6
1
Download
-
Ebook A technical guide to IPSec virtual private networks: Part 2 includes content: Chapter 9: key management, chapter 10: IKE in action, chapter 11: areas of interest within IKE, chapter 12: security policies and the security of VPNs, chapter 13: implementation considerations, chapter 14: product evaluation, chapter 15: report on IPSec.
193p
longtimenosee03
22-02-2024
4
2
Download
-
Ebook "Handbook of cloud computing" includes content: Cloud computing fundamentals, cloud computing technologies and applications, key enabling technologies for virtual private clouds, the role of networks in cloud computing, data intensive technologies for cloud computing, survey of storage and fault tolerance strategies used in cloud computing.
656p
haojiubujain07
20-09-2023
8
4
Download
-
Ebook CISSP: Certified information systems security professional study guide (3rd edition) - Part 1 includes contents: Chapter 1 accountability and access control; chapter 2 attacks and monitoring; chapter 3 iso model, network security, and protocols; chapter 4 communications security and countermeasures; chapter 5 security management concepts and principles; chapter 6 asset value, policies, and roles; chapter 7 data and application security issues; chapter 8 malicious code and application attacks; chapter 9 cryptography and private key algorithms.
379p
haojiubujain06
05-09-2023
9
4
Download
-
Ebook CISSP: Certified information systems security professional study guide (4th edition) - Part 2 includes contents: Chapter 9: cryptography and private key algorithms, chapter 10: PKI and cryptographic applications, chapter 11: principles of computer design, chapter 12: principles of security models, chapter 13: administrative management, chapter 14: auditing and monitoring, chapter 15: business continuity planning, chapter 16: disaster recovery planning, chapter 17: law and investigations, chapter 18: incidents and ethics, chapter 19: physical security requirements.
515p
haojiubujain06
05-09-2023
8
4
Download
-
This study provides an implementation of the extended Euclidean algorithm to find secret keys based on RSA cryptography and hopes that it can be of help to experts in the field of information security.
11p
viberkshire
09-08-2023
7
5
Download
-
Ebook HR Strategy for the high performing business: Inspiring success through effective human resource management – Part 2 includes contents: Chapter 6 Section 1: Energizing leadership to mobilize people; Chapter 7 Section 2: Build the team; Chapter 8 Section 3: Shared vision and values; Chapter 9 Section 4: Strategic framework; Chapter 10 Section 5: Aligned and lean organization; Chapter 11 Section 6: High-performing empowered teams; Chapter 12 Section 7: Coaching: develop yourself and others to win; Chapter 13 Section 8: Create a winning organizational climate; Chapter 14 Section 9: Deliv...
136p
haojiubujain02
03-07-2023
5
2
Download
-
Ebook Building the e-service society: E-commerce, e-business, and e-government - Part 1 includes the following content: Chapter 1: Towards key business process for e-government; Chapter 2: An intelligent search engine for electronic government applications for the resolutions of the united nations security council; Chapter 3: Knowledge in e-government; Chapter 4: Democracy in the electronic government era; Chapter 5: Usability evaluation as quality assurance of e-government services; Chapter 6: Rethinking trust and confidence in european e-government; Chapter 7: Exploring the relationship b...
239p
haojiubujain01
06-06-2023
8
5
Download
-
This research achieved its objectives of: Identify key attributes and variables that influences the design of a PPP Project; Identify key actions and events that influence the outcomes generated by a PPP project; Model design attributes and variables, and actions and outcomes found in PPP literature; Evaluate Australian practice as demonstrated in a case study, using the benchmark model; Discuss findings and present conclusions.
146p
runthenight04
02-02-2023
2
1
Download
-
Pepper is a major crop species of the Solanaceae family, largely appreciated for its high nutritional and healthy contribution to human diets. In the Mediterranean basin, the favorable pedoclimatic conditions enhanced the selection of several diversified landraces cultivated pepper (Capsicum annuum), for whom Italy can be considered a main pole of diversification.
16p
vihagrid
30-01-2023
5
3
Download
-
Lecture Distributed Systems - Lecture 13: Authentication in Distributed Systems. In this chapter, students will be able to understand: System model, role of cryptography, a simple model of cryptographic system intruder, a classification of cryptographic system, conventional cryptography, modern cryptography, private key cryptography, data encryption standard (DES), public key cryptography, the rivest-shamir-adleman method,…
30p
runordie1
10-05-2022
11
4
Download
-
Lecture Distributed Systems - Lecture 14: An Introduction to Kerberos. In this chapter, students will be able to understand: Kerberos basics, the basic notion, basic notions, protocols, phase - 1 (getting the initial key), phase - 2 (getting server tickets), phase - 3 (requesting the service), why two servers?
15p
runordie1
10-05-2022
9
4
Download
-
As the quantum analog of the classical one-time pad, the private quantum channel (PQC) plays a fundamental role in the construction of the maximally mixed state (from any input quantum state), which is very useful for studying secure quantum communications and quantum channel capacity problems.
10p
parasite
02-06-2021
8
1
Download
-
Chronic low back pain (cLBP) is a significant public health problem, being the primary cause of work absenteeism, as well as affecting sufferers’ quality of life, in industrialized society. International guidelines recommend intensive multidisciplinary approaches for patients with cLBP.
9p
viannito2711
20-04-2021
11
0
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)