intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security service

Xem 1-20 trên 111 kết quả Security service
  • This study was conducted. Moreover, it is shown that choosing the best Tx/Rx parameters is necessary to meet service quality requirements such as BER and transmission confidentiality. The provided findings provide insightful information about the practical considerations of deploying UWOC/ CDMA systems.

    pdf11p viengfa 28-10-2024 3 1   Download

  • This paper present a high-throughput, low latency 4-pipeline stages architecture of AES with efficient throughput per resource (Mbps/slice). The proposed implementation achieves a high throughput of 105.7 Gbps with an efficiency of 31.48 Mbps/slice. In comparison to state-of-the-art works, our design surpasses the majority of existing designs in terms of throughput and latency.

    pdf9p viyoko 01-10-2024 1 1   Download

  • Nối tiếp phần 1, phần 2 của cuốn sách "Quản trị Windows server 2008 (Tập 2)" gồm những nội dung chính sau: Chương 14 - Triển khai Windows Deployment Services; Chương 15 - Quản trị Group Policy; Chương 16 - Network Access Protection; Chương 17 - Bảo mật hệ thống với Windows Firewall;... Mời các bạn cùng tham khảo!

    pdf139p vankhinh0210 15-10-2023 9 4   Download

  • This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the application level.

    pdf182p runthenight07 01-03-2023 12 3   Download

  • Cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" giới thiệu tới người đọc các kiến thức về windows forms, security, kết hợp nhiều phần, file, web development, web services, các chủ đề cao cấp, xử lý dữ liệu. Sách gồm có 10 chủ đề lớn, phần 1 ebook sau đây gồm có các nội dung sau: Windows form, security, kết hợp nhiều phần, file, web development, web services, language. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.

    pdf361p runordie6 06-08-2022 26 7   Download

  • Nối tiếp phần 1, tài liệu Xây dựng và triển khai ứng dụng thương mại điện tử (Tập 2): Phần 2 tiếp tục trình bày những nội dung về đối tượng của ADO.NET và List Controls; ASP.NET và XML; truy cập dữ liệu SQL server với định dạng XML; xây dựng và kết hợp Web services vào ASP.NET; tìm kiếm, phân trang, điều hướng kết quả tìm kiếm bằng ASP.

    pdf400p linyanjun_2408 24-03-2022 44 4   Download

  • The article measures the effect of Human Resource Management (HRM) practices on organizational commitment in small and medium enterprises (SMEs). A survey of 379 employees working in Hanoi based SMEs in the commercial and service sector indicates that human resource training and development, performance evaluation, remuneration, job security, working environment, and organizational support have a positive affect on organizational commitment.

    pdf11p larachdumlanat129 14-01-2021 28 2   Download

  • Consumer behavior is the study of individuals, groups, or organizations and the processes they use to select, secure, and dispose of products, services, experiences, or ideas to satisfy needs and the impacts that these processes have on the consumer and society.

    pdf5p guineverehuynh 22-06-2020 35 0   Download

  • The aim of the present study is to examine the influence of website quality on consumer’s e-loyalty, noting the mediating role of e-trust, e-satisfaction, and perceived enjoyment. Besides, this study examines the consequence of consumer’s e-loyalty.

    pdf20p tohitohi 22-05-2020 44 4   Download

  • In this article, we analyze the information security risks of web services, evaluate existing solutions, and then select the most effective policies for the education database system. We have implemented security policies including authentication, authorization. In which authentication is based on OAuth 2.0 and JSON web tokens (JWT).

    pdf8p slimzslimz 08-12-2019 38 2   Download

  • In this paper, the authors use analytical method of explore factor analysis to determining factors that are components of the training quality (by service quality) at Lac Hong University (LHU) in Dong Nai province. This paper conducted during the period from from June 2012 to June, 2015. The exploratory factor analysis result showed that there were four factors, which included of factors following Teaching (Lecturers); Facilitie.

    pdf7p byphasse043256 23-03-2019 28 0   Download

  • Tài liệu "Internet Services: Phần 4" trình bày 8 nội dung sau: FTP, The secure shell (SSH), DNS, web server, squid server, mail server, firewall server, DS server. Chi tiết nội dung phần IV giáo trình mời các bạn tham khảo.

    pdf61p tranhanh9196 12-10-2018 60 4   Download

  • Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server. This module explains how Microsoft Exchange Server is a critical network service that is virtually always accessible from the Internet and how ISA Server 2004 can be used to provide security for Exchange Server and for securing client connections to Exchange.

    ppt34p nomoney2 10-02-2017 49 4   Download

  • Module 9: Securing network traffic by using IPSec. This module provides you with the knowledge and skills to secure network traffic and to use certificates with IPSec for increased security. After completing this module, students will be able to: Implement IPSec, understand IPSec deployment scenarios, monitor IPSec.

    ppt24p nomoney2 10-02-2017 51 3   Download

  • Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.

    pdf43p nhanmotchut_3 20-10-2016 63 4   Download

  • This chapter describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components of any data network. Identify the opportunities and challenges posed by converged networks. Describe the characteristics of network architectures: fault tolerance, scalability, quality of service and security. Install and use IRC clients and a Wikiserver.

    pdf55p youcanletgo_01 04-01-2016 58 5   Download

  • In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).

    pdf157p youcanletgo_01 04-01-2016 46 5   Download

  • Learning objectives of this chapter include: Identify the devices and protocols used in a small network; explain how a small network serves as the basis of larger networks; explain the need for basic security measures on network devices; identify security vulnerabilities and general mitigation techniques;...

    pdf55p youcanletgo_01 29-12-2015 66 4   Download

  • Bài giảng Bảo mật hệ thống thông tin: Chương 8 - Bảo mật các dịch vụ cơ sở dữ liệu thuê ngoài (Outsourcing Database Services Security) giới thiệu dịch vụ cơ sở dữ liệu thuê ngoài, bảo mật với dịch vụ CSDL thuê ngoài, mô hình nhà cung cấp dịch vụ.

    pdf31p cocacola_17 11-12-2015 130 18   Download

  • Objectives of Chapter 1: To define three security goals; to define security attacks that threaten security goals; to define security services and how they are related to the three security goals; to define security mechanisms to provide security services; to introduce two techniques, cryptography and steganography, to implement security mechanisms

    pdf4p levuphongqn 18-08-2015 74 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1468 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2