Techniques in security
-
Research Aims: The thesis aims to develop deep neural networks for analyzing security data. These techniques improve the accuracy of machine learning-based models applied in NAD. Therefore, the thesis attempts to address the above challenging problems in NAD using models and techniques in deep neural networks. Specifically, the following problems are studied.
128p armyofthedead 23-06-2021 14 3 Download
-
This chapter aims at providing a research background on mobile commerce. Also, this chapter postulates the research gaps. Briefly, it is the if and how the perception of risk and security simultaneously affects continuance intention to use mobile commerce under the influence of considerations of future consequences that generates the need to conduct this study. Also, based on the research gap, this study delineates the research methodology and research scope. Regarding the research methodology, this research includes two studies: the pilot study and the main study.
179p cothumenhmong6 17-07-2020 35 5 Download
-
The current challenges related to safety, security and economic efficiency lead to the consolidation of the level of education and training of merchant marine officers, through the interdependence and diversification of the curricula in the world economy of shipping, finance of the maritime industry and the specialized labour market.
9p christabelhuynh 04-06-2020 16 1 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 36 3 Download
-
We now begin our look at building protocols using the basic tools that we have discussed. The discussion in this lecture will focus on issues of key establishment and the associated notion of authentication These protocols are not real, but instead are meant to serve just as a high-level survey Later lectures will go into specific protocols and will uncover practical challenges faced when implementing these protocols
20p muathu_102 28-01-2013 66 9 Download
-
The Devil said to Daniel Webster: "Set me a task I can't carry out, and I'll give you anything in the world you ask for." Daniel Webster: "Fair enough. Prove that for n greater than 2, the equation an + bn = cn has no non-trivial solution in the integers." They agreed on a three-day period for the labor, and the Devil disappeared. At the end of three days, the Devil presented himself, haggard, jumpy, biting his lip. Daniel Webster said to him, "Well, how did you do at my task? Did you prove the theorem?' "Eh? No . . . no, I haven't...
18p muathu_102 28-01-2013 50 3 Download
-
Used to connect two private networks together via the Internet Used to connect remote users to a private network via the Internet This could be done by opening your firewall to the LAN networking protocols (NETBIOS, NFS NetWare, AppleTalk)) But… it would also make those protocols available to any one on the Internet and they could come into your LAN at will Effectively make the whole Internet your LAN Exposes all of your data Anyone can easily take advantage of vulnerabilities in your internal hosts No privacy Better solution is to use a VPN in conjunction with your firewall ...
18p muathu_102 28-01-2013 83 4 Download
-
Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM) in the Linux kernel, based on the principle of least privilege. It is not a Linux distribution, but rather a set of modifications that can be applied to Unix-like operating systems, such as Linux and BSD.
15p muathu_102 28-01-2013 94 11 Download
-
cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...
19p muathu_102 28-01-2013 28 2 Download
-
Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using the IP API but you can’t get at ICMP Raw Sockets expose ICMP you get a Raw Packet and populate the entire packet yourself for high level protocols like TCP and UDP you lose all of the functionality implemented in those layers choosing to use a Raw Socket must be weighed carefully Raw Sockets can be dangerous Raw Sockets can be against the law http://www.kumite.com/rsnbrgr/rob/grcspoof/cnn/ ...
9p muathu_102 28-01-2013 45 3 Download
-
Part of an overall Firewall strategy Sits between the local network and the external network Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance Primary mission is now to insure anonymity of internal users Still used for caching of frequently requested files Also used for content filtering Acts as a go-between, submitting your requests to the external network Requests are translated from your IP address to the Proxy’s IP address E-mail addresses of internal users are removed from request headers Cause an actual brea...
15p muathu_102 28-01-2013 79 4 Download
-
Used to communicate IP status and error messages between hosts and routers Uses IP to route its messages between hosts Must be implemented with IP remember, IP is just a packet delivery system transmits and routes datagrams from sources to destinations through a series of interconnected networks it has a checksum in the IP header to detect lost bits no error detection on the datagram payload though but has no native mechanism for source host notification This is where ICMP comes in its used to report IP errors to the source host ICMP data is carried as the payload of an IP datagram specifie...
19p muathu_102 28-01-2013 51 3 Download
-
Also called a Proxy Firewall Acts as a relay for application level traffic Typical applications: Telnet FTP SMTP HTTP More secure than packet filters Bad packets won't get through the gateway Only has to deal with application level packets Simplifies rules needed in packet filter
13p muathu_102 28-01-2013 66 3 Download
-
This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment. It contains many, but not all, issues professionals are likely to face. Section 1 outlines fundamental ethical considerations Section 2 addresses additional, more specific considerations of professional conduct. Section 3 pertain more specifically to individuals who have a leadership role, whether in the workplace or in a volunteer capacity such as with organizations like ACM. Section 4 addresses principles involving compliance with this Code ...
10p muathu_102 28-01-2013 56 2 Download
-
Genetic improvement of fish species is considered a priority area for research and development by the government of Viet Nam, particularly in the context of rural development, food security and poverty alleviation. The current proposal has been developed in consultation with Vietnamese staff of participating institutions. The project builds upon the existing collaborative links between Deakin University and the Research Institutes of Aquaculture (RIAs) in Viet Nam.
13p tam_xuan 02-03-2012 70 8 Download
-
The overall objective of the project is to increase food security and income of rural Vietnamese in coastal communities by improving the profitability, and environmental sustainability, of intensive aquaculture in Vietnam. This addresses identified priorities of the CARD Program to build capacity in areas of fisheries and aquaculture and livestock feed improvement. This will be delivered by building the teaching and research base for aquaculture nutrition at the University of Fisheries (UoF) at Nha Trang.
12p tam_xuan 02-03-2012 63 5 Download
-
Project this already start settings a Vườn ươm Macadamia new and grow Cường ba Vườn ươm current. 3 test Nghiêm of Macadamias khác nhau has been device kế, Khoang 1 ha có 14 same Macadamias phu combine, trong 3 provinces domain Bắc Việt Nam. Đào create has been implemented in the Khia canh Tuyên transfer, Join, device kế trang web và preparation Trọng, security trị and manage Forest in. This was bao including job allocated the CD, DVD và powerpoint Thất Thuyết the also as tay Đạo create. A chuyen tham quan Trung Quốc be implemented include all the Vườn ươm...
9p xinh_la 10-02-2012 71 7 Download