intTypePromotion=1 Tuyển sinh 2024 dành cho Gen-Z

The system security

Xem 1-20 trên 1674 kết quả The system security
  • Lecture Introduction to Software engineering - Lesson 12: System architecture. This lesson provides students with content about: design phase; creativity and design; system architecture; models for system architecture; program design; security; performance; components as replaceable elements; classes represent logical abstractions;... Please refer to the detailed content of the lecture!

    pdf43p codabach1016 03-05-2024 0 0   Download

  • The data collected using purposive sampling and Slovin formula. The hypothesis of this research is tested by multiple linier regression. The research results showed that the variable site design, informative, security and communication have a partialy significant effect to the online shopping customer satisfaction, while the convenience of shopping variable is not significant. This understandable because each online store has different system and procedure that incovenience for consumers.

    pdf9p longtimenosee10 26-04-2024 1 1   Download

  • This paper is objective to examine the barrier of ISO28000 implementation. As more and more supply chain process faced disruption and delay due to accident, importance of supply chain security management attract the concern from top management of organization. ISO 28000 is a standard that released in 2007 which specify requirement for security management system for the supply chain. However, there are still many organization didn’t apply for this standard.

    pdf8p longtimenosee10 26-04-2024 6 1   Download

  • A study of the state of the theory of fuzzy sets shows that until recently in Russia there were almost no studies in the chemical sector of the economy and finance using fuzzy analysis and forecasting, although by that time all necessary prerequisites for modeling financial systems had been created. The current situation in Russia is characterized by a high degree of science lagging behind the requests of state and commercial supply chain management.

    pdf6p longtimenosee10 26-04-2024 1 1   Download

  • Part 2 book "Power quality in power systems and electrical machines" includes content: Impact of poor power quality on reliability, relaying and security; the roles of filters in power systems; optimal placement and sizing of shunt capacitor banks in the presence of harmonics; unified power quality conditioner (UPQC).

    pdf333p dianmotminh00 22-04-2024 4 3   Download

  • This article examines the factors influencing the development of electronic banking services at LienViet Post Joint Stock Commercial Bank (LPBank). The results reveal seven factors that significantly impact the development of electronic banking services at LPBank, ranked in order of importance from high to low: Service products, Staff service capabilities, Accessibility convenience, Technological system, Reachability, Marketing & customer care, and finally, Security.

    pdf14p longtimenosee09 08-04-2024 2 0   Download

  • Protecting the safety of drivers in the bus is very important and necessary in front collisions. This research on the system shock absorber and absorption of force bus head in front collisions. This design will protect bus heads not violations in safe spaces and protect drivers in front collisions.

    pdf5p vijaychest 24-04-2024 3 2   Download

  • Part 2 book "Networking - The complete reference" by author Bobbi Sandberg includes content: TCP/IP, other TCP/IP protocols; the domain name system; internet services, windows chapter 18 active directory; linux; unix; other network operating systems and networking in the cloud, network clients; network security basics; wireless security; overview of network administration; network management and troubleshooting tools; backing up.

    pdf426p muasambanhan10 11-04-2024 4 1   Download

  • This paper reviews the challenges in implementing Industry 4.0. The literatures found in this paper mainly from Google Scholar, Science Direct and Emerald. In short, the challenges can be imparted into seven major categories. There are data management and Integration, knowledgedriven, process, security, capital, workforce, and education.

    pdf8p longtimenosee09 08-04-2024 4 0   Download

  • One of the main trends in the law development is its digitalization under the supply chain strategies, which is manifested both in the digitalization of legal regulation, legal technologies, legal processes and law enforcement. In the emergence of regulations affecting the issues of the digital economy, electronic state, information security.

    pdf6p longtimenosee09 08-04-2024 3 0   Download

  • The objective of the study is to analyze existing personnel risks and develop an adaptive, universal methodology for assessing their likelihood, with further modeling of possible risk scenarios. In the framework of the study, a two-stage method for estimating the probability of occurrence of 30 personnel risks characteristic of different types of personnel flows was tested. Possible scenarios were simulated using the Scenario Manager method.

    pdf9p longtimenosee09 08-04-2024 5 1   Download

  • Part 2 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: comparison of region based and weighted principal component analysis and locally salient ICA in terms of facial expression recognition; web health portal to enhance patient safety in Australian healthcare systems; peer-based complex profile management; detecting unwanted email using VAT; improving smart card security using elliptic curve cryptography over prime field (Fp);...

    pdf101p khuynhlinhnguyet1009 05-04-2024 1 1   Download

  • In today's world, smart surveillance plays an important role in protecting security and creating a safe living environment. For abnormal objects in the smart surveillance system, this is an important issue, requiring attention and timely response from managers and supervisors. To address this issue, the paper uses transfer learning techniques on modern object detection models to detect abnormal objects such as guns, knives, etc. in public places.

    pdf8p vilarry 01-04-2024 1 0   Download

  • Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.

    pdf589p longtimenosee08 31-03-2024 1 1   Download

  • The Cisco Certified Internet Expert Security Certification is an increasingly popular internetworking certification and one of the most popular security certifications in the world. Although CCIE certification builds on the foundation you might have established from the Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professional (CCNP) certifications, there is no prerequisite to attempt to gain CCIE certification. However, attaining CCNA and CCNP certifications will help you understand Cisco subjects and testing strategies.

    pdf524p longtimenosee08 31-03-2024 1 1   Download

  • Network security is a very complex business. The Cisco PIX Firewall performs some very specific functions as part of the security process. It is very important to be familiar with many networking and network security concepts before you undertake the CSPFA certification. This book is designed for security professionals or networking professionals who are interested in beginning the security certification process.

    pdf605p longtimenosee08 31-03-2024 5 1   Download

  • The Cisco Systems series of certifications provide you with a means of validating your expertise in certain core areas of study to current or prospective employers and to your peers. More network professionals are pursuing the Cisco Certified Security Professional (CCSP) certification because network security has become a critical element in the overall security plan of 21st-century businesses. This book is designed to help you attain this prestigious certification.

    pdf584p longtimenosee08 31-03-2024 3 1   Download

  • This book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like bank account hacking etc.

    pdf105p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Hardware hacking: Have fun while voiding your warranty – Part 2 includes contents: Chapter 8 hack your atari 5200 and 8-bit computer, chapter 9 hacking the playstation, chapter 10 wireless 802.11 hacks, chapter 11 hacking the ipod, chapter 12 can you hear me now? Nokia 6210 mobile phone modifications, chapter 13 upgrading memory on palm devices, chapter 14 operating systems overview, chapter 15 coding 101.

    pdf292p longtimenosee05 31-03-2024 1 0   Download

  • Ebook How to cheat at configuring open source security tools: The perfect reference for the multitasked sysadmin - Part 1 includes contents: Chapter 1: testing and auditing your systems, chapter 2: protecting your perimeter, chapter 3: protecting network resources, chapter 4: introducing snort, chapter 5: installing snort 2.6.

    pdf280p longtimenosee05 31-03-2024 1 0   Download


320 tài liệu
1224 lượt tải

nocache searchPhinxDoc


Đồng bộ tài khoản