intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Private key

Xem 1-20 trên 111 kết quả Private key
  • The study encompasses various analytical techniques, including descriptive statistics, Cronbach’s Alpha, Exploratory Factor Analysis (EFA), multivariate regression models, and hypothesis testing through SPSS software. The findings reveal that six key factors, namely leadership, digital business strategy, employee capabilities, technology infrastructure, organizational culture, and external market pressures, exert significant influence on digital transformation in these enterprises.

    pdf10p leminhvu111 07-06-2024 1 0   Download

  • This research delves into the assessment of Capital Adequacy Ratio (CAR) among Joint-Stock Commercial Banks (JSCBs) in Vietnam from 2015 to 2022. It investigates the variations in CAR over this period and explores its association with key financial metrics, including Return on Assets (ROA), Deposit Ratio (DEP), Liquidity (LIQ), Loan-to-Asset Ratio (LOA), Loan Loss Reserve (LLR), Non-Performing Loan Ratio (NPL), Leverage (LEV), bank size (SIZE), and the scale of board governance (BoardS).

    pdf9p leminhvu111 07-06-2024 2 0   Download

  • This research study is an insight into the intricate relationship between macroeconomic factors and the performance of the Vietnam’s stock market. Drawing on an extensive dataset covering the recent five-year period, the study employs a multifaceted methodology that combines data analysis, time-series modeling, and sector-specific analysis to comprehensively evaluate the dynamic interactions between key macroeconomic indicators and stock market returns.

    pdf13p leminhvu111 07-06-2024 0 0   Download

  • The corporate bond market (CBM) plays a very important role in the development of the financial market and the economy in each country. The supply of corporate bonds (CBs) is one of key factors contributing to the development of the market. On the basis of clarifying the role of corporate bond supply, the article focuses on evaluating the corporate bond supply of the Vietnamese corporate bond market (VCBM) in the period of 2019-2022, thereby proposing recommendations for developing the supply for the VCBM in the coming years.

    pdf7p leminhvu111 07-06-2024 0 0   Download

  • The proposed method offers three-level protection the usage of AES algorithm and a secure personal key. The approach also provides data tankage privateness safety because of huge groups yet the discovery about sensitive facts tankage leaks. Our order gives some on the privateness practices ancient within wind computing services.

    pdf4p longtimenosee06 27-03-2024 2 1   Download

  • This study provides insights on how PPPs can enable city administrations to play a key role for supporting climate sustainable agenda of nations especially in Sub Saharan Africa that is considered a victim of climate change and yet this part of the world is deemed to have been insignificantly responsible for the climate change by largely affected negative effects of today’s climate change.

    pdf14p longtimenosee06 27-03-2024 3 2   Download

  • Malaysian nowadays prefer more on private transport such as car and motorcycle compared to public bus. This decision may be due to personal experience when the services do not meet the expected satisfaction. Understanding the key factors of bus performance is important because it related users’ loyalty and ridership issue. This article reviews an approach that acknowledged by previous studies in an interest of assisting public bus transportation planning that advantage of sustainable public transportation system.

    pdf4p longtimenosee04 06-03-2024 6 1   Download

  • Ebook A technical guide to IPSec virtual private networks: Part 2 includes content: Chapter 9: key management, chapter 10: IKE in action, chapter 11: areas of interest within IKE, chapter 12: security policies and the security of VPNs, chapter 13: implementation considerations, chapter 14: product evaluation, chapter 15: report on IPSec.

    pdf193p longtimenosee03 22-02-2024 4 2   Download

  • Ebook "Handbook of cloud computing" includes content: Cloud computing fundamentals, cloud computing technologies and applications, key enabling technologies for virtual private clouds, the role of networks in cloud computing, data intensive technologies for cloud computing, survey of storage and fault tolerance strategies used in cloud computing.

    pdf656p haojiubujain07 20-09-2023 8 4   Download

  • Ebook CISSP: Certified information systems security professional study guide (3rd edition) - Part 1 includes contents: Chapter 1 accountability and access control; chapter 2 attacks and monitoring; chapter 3 iso model, network security, and protocols; chapter 4 communications security and countermeasures; chapter 5 security management concepts and principles; chapter 6 asset value, policies, and roles; chapter 7 data and application security issues; chapter 8 malicious code and application attacks; chapter 9 cryptography and private key algorithms.

    pdf379p haojiubujain06 05-09-2023 9 4   Download

  • Ebook CISSP: Certified information systems security professional study guide (4th edition) - Part 2 includes contents: Chapter 9: cryptography and private key algorithms, chapter 10: PKI and cryptographic applications, chapter 11: principles of computer design, chapter 12: principles of security models, chapter 13: administrative management, chapter 14: auditing and monitoring, chapter 15: business continuity planning, chapter 16: disaster recovery planning, chapter 17: law and investigations, chapter 18: incidents and ethics, chapter 19: physical security requirements.

    pdf515p haojiubujain06 05-09-2023 8 4   Download

  • This study provides an implementation of the extended Euclidean algorithm to find secret keys based on RSA cryptography and hopes that it can be of help to experts in the field of information security.

    pdf11p viberkshire 09-08-2023 7 5   Download

  • Ebook HR Strategy for the high performing business: Inspiring success through effective human resource management – Part 2 includes contents: Chapter 6 Section 1: Energizing leadership to mobilize people; Chapter 7 Section 2: Build the team; Chapter 8 Section 3: Shared vision and values; Chapter 9 Section 4: Strategic framework; Chapter 10 Section 5: Aligned and lean organization; Chapter 11 Section 6: High-performing empowered teams; Chapter 12 Section 7: Coaching: develop yourself and others to win; Chapter 13 Section 8: Create a winning organizational climate; Chapter 14 Section 9: Deliv...

    pdf136p haojiubujain02 03-07-2023 5 2   Download

  • Ebook Building the e-service society: E-commerce, e-business, and e-government - Part 1 includes the following content: Chapter 1: Towards key business process for e-government; Chapter 2: An intelligent search engine for electronic government applications for the resolutions of the united nations security council; Chapter 3: Knowledge in e-government; Chapter 4: Democracy in the electronic government era; Chapter 5: Usability evaluation as quality assurance of e-government services; Chapter 6: Rethinking trust and confidence in european e-government; Chapter 7: Exploring the relationship b...

    pdf239p haojiubujain01 06-06-2023 8 5   Download

  • This research achieved its objectives of: Identify key attributes and variables that influences the design of a PPP Project; Identify key actions and events that influence the outcomes generated by a PPP project; Model design attributes and variables, and actions and outcomes found in PPP literature; Evaluate Australian practice as demonstrated in a case study, using the benchmark model; Discuss findings and present conclusions.

    pdf146p runthenight04 02-02-2023 2 1   Download

  • Pepper is a major crop species of the Solanaceae family, largely appreciated for its high nutritional and healthy contribution to human diets. In the Mediterranean basin, the favorable pedoclimatic conditions enhanced the selection of several diversified landraces cultivated pepper (Capsicum annuum), for whom Italy can be considered a main pole of diversification.

    pdf16p vihagrid 30-01-2023 5 3   Download

  • Lecture Distributed Systems - Lecture 13: Authentication in Distributed Systems. In this chapter, students will be able to understand: System model, role of cryptography, a simple model of cryptographic system intruder, a classification of cryptographic system, conventional cryptography, modern cryptography, private key cryptography, data encryption standard (DES), public key cryptography, the rivest-shamir-adleman method,…

    pdf30p runordie1 10-05-2022 11 4   Download

  • Lecture Distributed Systems - Lecture 14: An Introduction to Kerberos. In this chapter, students will be able to understand: Kerberos basics, the basic notion, basic notions, protocols, phase - 1 (getting the initial key), phase - 2 (getting server tickets), phase - 3 (requesting the service), why two servers?

    pdf15p runordie1 10-05-2022 9 4   Download

  • As the quantum analog of the classical one-time pad, the private quantum channel (PQC) plays a fundamental role in the construction of the maximally mixed state (from any input quantum state), which is very useful for studying secure quantum communications and quantum channel capacity problems.

    pdf10p parasite 02-06-2021 8 1   Download

  • Chronic low back pain (cLBP) is a significant public health problem, being the primary cause of work absenteeism, as well as affecting sufferers’ quality of life, in industrialized society. International guidelines recommend intensive multidisciplinary approaches for patients with cLBP.

    pdf9p viannito2711 20-04-2021 11 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2