Security environment
-
Vietnam experiences increasing droughts throughout the dry season due to climate change, global warming, and human-caused activities like urbanization and deforestation. Drought hazard significantly impacts socioeconomic, agriculture, and the environment; it directly threatens human lives, livelihoods, food security, and environmental degradation.
13p vifaye 20-09-2024 4 1 Download
-
This paper captures the persistently changing dimensions and new paradigms of water security providing a holistic view including a wide range of sustainable solutions to address the water challenges.
21p hoanglongjp 14-07-2023 10 5 Download
-
This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the application level.
182p runthenight07 01-03-2023 12 3 Download
-
Research purposes: To establish indicators of WRS for river basins in Viet Nam which are appropriate to charateristics and water use of basins; To use the proposed indexs to assess WRS for typical regions in Ma river basin; subsequently, proposing oriented solutions to make WRS feasible and appropriate to real conditions.
27p hobbsandshaw 09-06-2021 14 4 Download
-
The article measures the effect of Human Resource Management (HRM) practices on organizational commitment in small and medium enterprises (SMEs). A survey of 379 employees working in Hanoi based SMEs in the commercial and service sector indicates that human resource training and development, performance evaluation, remuneration, job security, working environment, and organizational support have a positive affect on organizational commitment.
11p larachdumlanat129 14-01-2021 28 2 Download
-
In this context, the European Nuclear Cogeneration Industrial Initiative (NC2I) has launched the projects NC2I-R and GEMINI+ aiming to prepare the deployment of High Temperature Gas-cooled Reactors (HTGR) for this purpose.
7p christabelhuynh 29-05-2020 15 3 Download
-
In this chapter, the following content will be discussed: What operating systems do, computer-system organization, computer-system architecture, operating-system structure, operating-system operations, process management, memory management, storage management, protection and security, kernel data structures, computing environments, open-source operating systems
58p dien_vi02 07-10-2018 39 1 Download
-
In this chapter: Explain the basic concepts of a switched environment, configure initial settings on a Cisco switch, configure switch ports to meet network requirements, configure the management switch virtual interface, describe basic security attacks in a switched environment, describe security best practices in a switched environment, configure the port security feature to restrict network access.
52p youcanletgo_01 29-12-2015 89 6 Download
-
This chapter explain the purpose of VLANs in a switched network, analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment, configure a switch port to be assigned to a VLAN based on requirements,... Inviting you to refer.
49p youcanletgo_01 29-12-2015 52 3 Download
-
Bài giảng chương 4 trang bị cho người học những hiểu biết về cách hiện thực và quản lý các tài khoản group và computer. Mục đích của chương này nhằm giúp người học: Hiểu mục đích của việc dùng các tài khoản group là để đơn giản hóa việc quản trị, tạo các đối tượng group dùng công cụ giao diện đồ họa cũng như dòng lệnh, quản lý các group security và các group distribution,... Mời các bạn cùng tham khảo.
50p kiepnaybinhyen_03 15-12-2015 74 6 Download
-
Chương 14 trang bị cho người học những hiểu biết về các đặc tính bảo mật trong Windows Server 2003. Mục tiêu học tập của chương này gồm có: Xác định các phần tử và kỹ thuật khác nhau dùng để bảo mật hệ thống Windows Server 2003, Dùng các công cụ Security Configuration and Analysis để cấu hình và rà soát các thiết lập bảo mật, kiểm toán truy vập vào các tài nguyên và xem lại các thiết lập Security log. Mời tham khảo.
45p kiepnaybinhyen_03 15-12-2015 71 7 Download
-
Lecture Operating System: Chapter 09 - Security presented The security environment, Basics of cryptography, User authentication, Attacks from inside the system, Attacks from outside the system, Protection mechanisms, Trusted systems.
56p talata_1 22-09-2014 90 7 Download
-
Investments can be accounted for in a variety of ways depending upon the nature of the investment instrument. We will begin this chapter by looking at the accounting for bonds, or debt securities. Once we’ve completed our discussion of debt securities we will move on to the accounting for equity securities.
52p phantuannam 03-08-2013 64 4 Download
-
Companies must report both net income and comprehensive income and reconcile the difference between the two. The following items are part of comprehensive income: Changes in the market value of securities available for sale (described in Chapter 12).
57p phantuannam 03-08-2013 63 7 Download
-
Hệ điều hành là gì? Tổ chức hệ thống máy tính (Computer-System Organization) Kiến trúc hệ thống máy tính (Computer-System Architecture) Cấu trúc hệ điều hành (Operating-System Structure) Các hoạt động hệ điều hành (Operating-System Operations) Quản trị quá trình (Process Management) Quản trị bộ nhớ (Memory Management) Quản trị lưu trữ (Storage Management) Bảo vệ và an ninh (Protection and Security) Các hệ thống phân tán (Distributed Systems) Các hệ thống mục đích đặc biệt (Special-Purpose Systems) Môi trường tính toán (Computing Environments)...
40p duytan7697 13-06-2013 83 16 Download
-
A computer virus is a piece of code hiding in a program that can automatically copy itself or embed a mutation of itself in other programs Cannot spread on their own Often require a host program to live in Infected program: a host program with virus Uninfected program (healthy program): a program cleared of all viruses Disinfected program: a program once infected but now cleared of viruses Specific to particular types of file systems, file formats, and operating systems Particular types of architecture, CPU, languages, macros, scripts, debuggers, and every other form of programming or syst...
40p muathu_102 28-01-2013 54 4 Download
-
Hệ điều hành là gì? Tổ chức hệ thống máy tính (Computer-System Organization) Kiến trúc hệ thống máy tính (Computer-System Architecture) Cấu trúc hệ điều hành (Operating-System Structure) Các hoạt động hệ điều hành (Operating-System Operations) Quản trị quá trình (Process Management) Quản trị bộ nhớ (Memory Management) Quản trị lưu trữ (Storage Management) Bảo vệ và an ninh (Protection and Security) Các hệ thống phân tán (Distributed Systems) Các hệ thống mục đích đặc biệt (Special-Purpose Systems) Môi trường tính toán (Computing Environments)...
40p nghiapro512 22-09-2012 161 37 Download
-
The 12th of June 2012 Microsoft published a security advisory with a temporary fix related to the msxml core services vulnerability which is heavily exploited in the wild. On June 18th 2012 Metasploit released a working exploit. On June 19th 2012 a 100% reliable exploit for Internet Explorer 6/7/8/9 on Windows XP/Vista, and Windows 7 SP1 was published by metasploit. On July 9th 2012 Microsoft finally released a security update in order to patch this vulnerability.
27p whitewolf9500 16-09-2012 46 2 Download
-
History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface To explore the principles upon which Windows XP is designed and the specific components involved in the system To understand how Windows XP can run programs designed for other operating systems To provide a detailed explanation of the Windows XP file system To illustrate the networking protocols supported in Windows XP To cover the interface available to system and application programmers .
64p perpan 02-09-2012 65 9 Download
-
Linux History Design Principles Kernel Modules Process Management Scheduling Memory Management File Systems Input and Output Interprocess Communication Network Structure Security To explore the history of the UNIX operating system from which Linux is derived and the principles which Linux is designed upon To examine the Linux process model and illustrate how Linux schedules processes and provides interprocess communication To look at memory management in Linux To explore how Linux implements file systems and manages I/O devices...
62p perpan 02-09-2012 77 16 Download